Run basic functions from stripped binaries cross platform
☆113Dec 13, 2016Updated 9 years ago
Alternatives and similar repositories for ctf_import
Users that are interested in ctf_import are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Simple hash-mining c library and its python binding.☆64Jun 28, 2019Updated 6 years ago
- ☆77May 3, 2015Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- A purely academic effort to compile a subset of C to a 3-symbol, 5-tape simulated turing machine ruleset.☆11Sep 17, 2011Updated 14 years ago
- ☆19Jan 30, 2016Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- ☆17May 13, 2019Updated 6 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆508May 11, 2021Updated 4 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Better CodeEditor for Ida Pro.☆230Dec 25, 2020Updated 5 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Imports Reconstructor☆31Mar 17, 2016Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ELF Unstrip Tool☆107Aug 19, 2015Updated 10 years ago
- trace local function calls like strace and ltrace☆73Jan 20, 2017Updated 9 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- ☆11May 19, 2017Updated 8 years ago
- Plugins for IDA Pro and Hex-Rays☆46Jun 4, 2018Updated 7 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- A Miasm2 based function divination.☆543Jun 9, 2020Updated 5 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year