rootkiter / Reverse-binsLinks
Same code , different CPU case , different build case , Iot bins reverse learning.
☆29Updated 8 years ago
Alternatives and similar repositories for Reverse-bins
Users that are interested in Reverse-bins are comparing it to the libraries listed below
Sorting:
- 使用intel pin来求解一部分CTF challenge☆32Updated 7 years ago
- ☆29Updated 7 years ago
- Useful tools for writing shellcode☆69Updated 5 years ago
- ☆80Updated 7 years ago
- Mirai☆42Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 4 years ago
- 物联网设备分析环境搭建与工具使用,包括脚本换阿里源、binwalk的完整安装、firmwalker和rips的使用☆45Updated 7 years ago
- embedded-device-lab是一个利用qemu模拟真实世界中物联网漏洞的测试环境。由于物联网架构的特殊性,调试分析漏洞通常需要使用qemu模拟执行不同架构的可执行文件。而各种搭建环境,交叉编译是一件费事费力,令人忧伤的工作。 embedded-device-la…☆56Updated 7 years ago
- VxWorks Fuzzer with AFL and QEMU☆49Updated 5 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆36Updated 5 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆53Updated 8 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 8 years ago
- plugin of ida with pin☆48Updated 5 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Updated 3 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Updated 9 years ago
- Windows builds for use with angr framework☆29Updated 9 years ago
- ☆26Updated 8 years ago
- Some CVE resources☆27Updated 6 years ago
- POC and exploitation of vulnerabilities☆91Updated 3 years ago
- Suspended☆75Updated 9 years ago
- a pwn demo for easy manage a pwn server☆25Updated 9 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 6 years ago
- linux system call hook framework☆47Updated 7 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- Git copy of idapython svn repo: https://code.google.com/p/idapython/☆48Updated 11 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Updated 9 years ago
- ☆45Updated 5 years ago
- ☆41Updated 8 years ago
- ☆12Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago