Run basic functions from stripped binaries cross platform
☆113Dec 13, 2016Updated 9 years ago
Alternatives and similar repositories for ctf_import
Users that are interested in ctf_import are comparing it to the libraries listed below
Sorting:
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Simple hash-mining c library and its python binding.☆64Jun 28, 2019Updated 6 years ago
- ☆77May 3, 2015Updated 10 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- A purely academic effort to compile a subset of C to a 3-symbol, 5-tape simulated turing machine ruleset.☆11Sep 17, 2011Updated 14 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Better CodeEditor for Ida Pro.☆229Dec 25, 2020Updated 5 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- ☆17May 13, 2019Updated 6 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆26Dec 3, 2015Updated 10 years ago
- ELF Unstrip Tool☆107Aug 19, 2015Updated 10 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79May 28, 2016Updated 9 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Nov 28, 2016Updated 9 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- ☆34Dec 3, 2016Updated 9 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 9 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- Codemap☆127Jan 13, 2017Updated 9 years ago