stephenR / gdb_scripts
☆14Updated 7 years ago
Alternatives and similar repositories for gdb_scripts:
Users that are interested in gdb_scripts are comparing it to the libraries listed below
- ☆12Updated 7 years ago
- ☆11Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- ☆17Updated 5 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 9 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- WTF are those magic numbers?!!☆33Updated 3 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Updated 10 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Updated 6 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 2 years ago
- checksec tool for win10☆25Updated 7 years ago
- ☆24Updated 7 years ago
- by http://whereisk0shl.top/☆35Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Watching the Flag☆15Updated 9 years ago
- ☆13Updated 6 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 8 years ago
- Ruby plugin for IDAPro☆25Updated 13 years ago
- ☆22Updated 6 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Updated 7 years ago
- GDB command for reattaching to the new instance of the process (help exploit development)☆12Updated 8 years ago