tmr232 / RECon2017Links
RECon 2017 IDA skin & color scheme
☆28Updated 8 years ago
Alternatives and similar repositories for RECon2017
Users that are interested in RECon2017 are comparing it to the libraries listed below
Sorting:
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- ☆26Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 9 years ago
- Personal repository for all ctf related stuffs☆67Updated last year
- windows kernel vulnerability found by me☆90Updated 8 years ago
- ☆45Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Updated 9 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- A fuzz job for ClamAV☆32Updated 9 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆52Updated 8 years ago
- ☆39Updated 4 years ago
- ☆35Updated 10 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 10 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 9 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Updated 10 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- IDATACO IDA Pro Plugin☆46Updated 9 years ago