szk3y / one-gadget-libView external linksLinks
A python library to find one-gadget
☆30Feb 22, 2019Updated 6 years ago
Alternatives and similar repositories for one-gadget-lib
Users that are interested in one-gadget-lib are comparing it to the libraries listed below
Sorting:
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Doublethink challenge from DEF CON 2018☆23Dec 22, 2019Updated 6 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- (fast) Capstone Go bindings☆11Aug 8, 2018Updated 7 years ago
- GDB for pwn☆11Sep 10, 2025Updated 5 months ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Cheat Sheets of the tools/programming languages☆11Jul 8, 2018Updated 7 years ago
- A tool to inject C code into ELF64 binaries☆30May 25, 2021Updated 4 years ago
- Heap exploitation technique bypassing heap ASLR☆48Sep 2, 2019Updated 6 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- ☆11May 19, 2017Updated 8 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- WCTF 2019 Onsite(Master) Challenge☆53Jul 8, 2019Updated 6 years ago
- Packages for IDA Pro (written in python but supports all)☆132Jan 4, 2021Updated 5 years ago
- ☆15Oct 12, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- Some of my CTF solutions☆80May 13, 2019Updated 6 years ago
- A small library that help CTFer quickly write payload☆24Jun 19, 2019Updated 6 years ago
- Some CTF write up☆255Aug 29, 2025Updated 5 months ago
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago