saelo / armpwnLinks
Repository to train/learn memory corruption on the ARM platform.
☆357Updated 8 years ago
Alternatives and similar repositories for armpwn
Users that are interested in armpwn are comparing it to the libraries listed below
Sorting:
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- GATEKEEPER: Inline and on-target defense☆121Updated 3 years ago
- 2016 DEF CON Qualifier Challenges☆178Updated 9 years ago
- Simplify format string exploitation.☆345Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288Updated 9 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆182Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- jemalloc heap exploitation framework☆465Updated 4 years ago
- Radare Congress Stuff☆214Updated 2 months ago
- ☆159Updated 10 years ago
- A distributed fuzzing testing suite with web administration☆375Updated 6 years ago
- Release Branches for MoFlow☆305Updated 10 years ago
- ☆280Updated 5 years ago
- ☆236Updated 7 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- Scripts for Binary Ninja☆258Updated 2 years ago
- ☆167Updated 8 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆417Updated 7 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Updated 6 years ago
- capstone based disassembler for extracting to binnavi☆230Updated 9 years ago
- Visualization of heap operations.☆617Updated last year
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆408Updated 3 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆356Updated 6 years ago
- CTF Writeups☆190Updated 8 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆296Updated 8 years ago
- Function redirection via ELF tricks.☆162Updated 10 years ago
- A collection of more than 1000 binary libc files☆90Updated 10 years ago
- PEDA - Python Exploit Development Assistance for GDB☆96Updated 9 years ago
- binary patching from Python☆638Updated 2 years ago