sashs / arm_exploitationLinks
Exploitation on ARM-based Systems (Troopers18)
☆148Updated 7 years ago
Alternatives and similar repositories for arm_exploitation
Users that are interested in arm_exploitation are comparing it to the libraries listed below
Sorting:
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Symbolic Execution Tool in r2☆105Updated 3 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- A program to draw rectangles from heap traces.☆134Updated 5 years ago
- ☆87Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 7 years ago
- Radare 2 wiki☆92Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Scripts for Binary Ninja☆255Updated 2 years ago
- ☆163Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 4 years ago
- Code and exercises for a workshop on z3 and angr☆228Updated 4 years ago
- ☆90Updated 6 years ago
- GlibC Malloc for Exploiters presentation☆147Updated 5 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- Radare Congress Stuff☆209Updated 6 months ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Function redirection via ELF tricks.☆160Updated 9 years ago
- Radare2 cheat-sheet☆113Updated 6 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆208Updated 2 years ago
- ☆49Updated 7 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 7 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆179Updated 10 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Updated 6 years ago