scratchadams / PRE-Resources
Protocol Reverse Engineering Resources
☆20Updated last year
Alternatives and similar repositories for PRE-Resources:
Users that are interested in PRE-Resources are comparing it to the libraries listed below
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆99Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆54Updated last month
- Leveraging patch diffing to discover new vulnerabilities☆109Updated 2 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 9 months ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated this week
- Binary exploitation by confusing the unwinder☆60Updated last year
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- ☆59Updated last month
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆48Updated last week
- Damn Vulenerable Kernel Module for kernel fuzzing☆49Updated 2 months ago
- Old and new CTFs about Linux kernel exploitation.☆52Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- CTF challenges that I created☆18Updated 3 years ago
- ☆76Updated 3 months ago
- A library for patching ELFs☆53Updated 4 years ago
- ☆34Updated 8 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Python bindings for BochsCPU☆35Updated 3 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 8 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆63Updated last year
- Kernel Read Write Execute☆40Updated this week
- ☆74Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆33Updated last month
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆74Updated 3 months ago
- Slides about HyperDbg☆30Updated 7 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆74Updated 2 weeks ago