st4g3r / House-of-Einherjar-CB2016View external linksLinks
Some stuffs for CODE BLUE 2016
☆23Oct 26, 2016Updated 9 years ago
Alternatives and similar repositories for House-of-Einherjar-CB2016
Users that are interested in House-of-Einherjar-CB2016 are comparing it to the libraries listed below
Sorting:
- Heap exploitation technique bypassing heap ASLR☆48Sep 2, 2019Updated 6 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- Plugin for binary ninja to centralize features useful in static analysis.☆15Mar 3, 2020Updated 5 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 12 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- HotFuzz is a fuzz testing utility that generates random data and sends it to a service's endpoint over HTTP or HTTPS based on a given fuz…☆18Mar 14, 2021Updated 4 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- A VM for CTF binary exploitation challenges☆20Mar 11, 2020Updated 5 years ago
- Lewis & Clark CCDC Team Resources☆17Mar 27, 2015Updated 10 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- ☆21Apr 2, 2024Updated last year
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 4 years ago
- A small library that help CTFer quickly write payload☆24Jun 19, 2019Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- A Pictorial Book of Tor Hidden Services.☆25Dec 1, 2017Updated 8 years ago
- ☆51Mar 23, 2018Updated 7 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- ☆26Feb 16, 2021Updated 5 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- IDA AArch64 processor extender extension: Adding crypto extension instructions (AES/SHA1/SHA256)☆24Nov 26, 2016Updated 9 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- ☆25Mar 18, 2018Updated 7 years ago
- A collection of extensions to angr to handle new platforms☆69Nov 21, 2025Updated 2 months ago