teambi0s / secREtaryLinks
The Reverse Engineering Assistant of your dreams
☆31Updated 3 years ago
Alternatives and similar repositories for secREtary
Users that are interested in secREtary are comparing it to the libraries listed below
Sorting:
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆17Updated 4 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 3 weeks ago
- Python module for demangling rust function names☆18Updated 4 years ago
- ☆46Updated last year
- REVerse ENGineering Environment☆61Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆189Updated last year
- Target components for kAFL/Nyx Fuzzer☆34Updated last year
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆75Updated last month
- Multi-tool reverse engineering collaboration solution.☆140Updated last year
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆76Updated 2 years ago
- Build your emulation environment as needed☆67Updated 4 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- ☆82Updated 2 years ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆122Updated this week
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆72Updated 3 years ago
- Repository for officially supported Binary Ninja plugins☆49Updated 3 months ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- A library for patching ELFs☆56Updated 4 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆31Updated 2 months ago
- ☆78Updated 2 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆93Updated last year