z3 scripts and ctf challenge solutions.
☆24Dec 21, 2022Updated 3 years ago
Alternatives and similar repositories for z3-stuff
Users that are interested in z3-stuff are comparing it to the libraries listed below
Sorting:
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- zygotebench - benchmark process creation speed on Android☆13Dec 4, 2013Updated 12 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- ☆24Mar 3, 2020Updated 6 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- ☆15Mar 25, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- just my way of printing info☆16Feb 9, 2021Updated 5 years ago
- My personal notes ✍️☆35Dec 20, 2023Updated 2 years ago
- ☆16Oct 31, 2021Updated 4 years ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆35Jun 15, 2017Updated 8 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago
- My solutions for CTF challenges☆75Dec 16, 2025Updated 2 months ago
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 4 years ago
- Plugins for IDA Pro and Hex-Rays☆46Jun 4, 2018Updated 7 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆27Dec 27, 2021Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Decrypt and log process SSL traffic via Frida Injection☆18Feb 25, 2022Updated 4 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- ☆61Feb 8, 2016Updated 10 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago