therealsaumil / arm_shellcode
Make ARM Shellcode Great Again
☆62Updated 3 years ago
Alternatives and similar repositories for arm_shellcode:
Users that are interested in arm_shellcode are comparing it to the libraries listed below
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- Automatic Vulnerability Discovery☆37Updated 5 years ago
- ☆88Updated 6 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆63Updated 5 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 4 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- ☆91Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆39Updated 6 years ago
- ☆100Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 6 years ago
- ☆91Updated 3 years ago
- For code snippets and information☆41Updated 5 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆88Updated 5 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆23Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆108Updated 5 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆54Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆89Updated 6 years ago
- ☆122Updated 6 years ago