tastelessctf / ctf2019Links
Tasteless CTF 2019
☆20Updated 6 years ago
Alternatives and similar repositories for ctf2019
Users that are interested in ctf2019 are comparing it to the libraries listed below
Sorting:
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- tool for multi-execution jump coverage introspection☆68Updated 11 months ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Updated 7 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 3 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- Patches to afl to fix bugs or add enhancements☆82Updated 6 years ago
- View Linux perf traces in IDA Pro☆15Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 6 years ago
- ☆41Updated 5 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated last year
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated 2 months ago
- ☆50Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 3 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆71Updated 5 years ago
- ☆96Updated 6 years ago
- Library to wrap all file calls when fuzzing with AFL++☆51Updated 2 years ago