tghack / tg16hack
TG 2016 hacking compo repo
☆10Updated 9 years ago
Alternatives and similar repositories for tg16hack:
Users that are interested in tg16hack are comparing it to the libraries listed below
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 7 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆28Updated 12 years ago
- REIL translation library☆36Updated 8 years ago
- ☆22Updated 6 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- ☆13Updated 7 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Updated 11 years ago
- A simple Windows driver which crashes the system and turns the BSOD pink☆19Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- ☆49Updated 7 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Updated 8 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Updated 7 years ago
- A pin tool to visualise heap operations☆21Updated 9 years ago
- ☆27Updated 3 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆64Updated 10 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- A collection of useful radare2 scripts!☆30Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- ☆28Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 8 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- ☆44Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago