stephenR / gdb_scripts
☆14Updated 6 years ago
Related projects: ⓘ
- ☆11Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- ☆19Updated this week
- IDA plugin for software reverse-engineering and visualization.☆7Updated 8 years ago
- ☆50Updated this week
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- checksec tool for win10☆25Updated 7 years ago
- ☆18Updated 5 years ago
- everyone can fuzz h2☆23Updated 5 years ago
- ☆27Updated this week
- Code samples used for the blog post☆23Updated 7 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 7 years ago
- ☆8Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆21Updated 9 years ago
- z3 scripts and ctf challenge solutions.☆24Updated last year
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Updated 7 years ago
- keynote I gave at GreHack 2019☆18Updated 4 years ago
- ☆22Updated 6 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 6 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 5 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 5 years ago
- Watching the Flag☆15Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆37Updated 7 years ago
- ☆28Updated this week
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Updated 6 years ago
- idapython scripts☆11Updated 7 years ago
- Simulate afl-fuzz☆16Updated 5 years ago
- GDB command for reattaching to the new instance of the process (help exploit development)☆12Updated 7 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- ☆16Updated this week