veritas501 / ae64
basic amd64 alphanumeric shellcode encoder
☆182Updated last year
Alternatives and similar repositories for ae64:
Users that are interested in ae64 are comparing it to the libraries listed below
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆213Updated last month
- Templates for deploying pwn challenge in ctf☆36Updated last year
- A simple shell script to get main_arena offset of a given libc☆113Updated 5 years ago
- ☆43Updated 3 years ago
- A plugin to resolve .plt.sec symbols in IDA☆78Updated 4 years ago
- Angr CTF From introduction to mastery☆137Updated 3 months ago
- Automatically exported from code.google.com/p/alpha3☆54Updated 4 years ago
- A tool to initialize pwn game exploit enviroment.☆34Updated 2 months ago
- ☆222Updated 4 years ago
- windows debug and exploit toolset for both user and kernel mode☆177Updated 5 months ago
- Libsearcher improved according to my personal habits.LibcSearcher所启发优化而来的项目优化代码部分逻辑,使在使用更便捷的基础上,添加one_gatge查询功能。☆33Updated 2 years ago
- ☆334Updated 2 years ago
- ☆46Updated 3 months ago
- 汉化加补充自己的理解☆29Updated 4 years ago
- ☆91Updated last year
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆123Updated last month
- a GDB plug-in for inspecting mallocng☆54Updated 6 months ago
- 🔍 LibcSearcher-ng -- get symbols' offset in glibc.☆105Updated 2 years ago
- Some pwn challenges selected for training and education.☆380Updated last year
- Do pwn by command line☆356Updated 2 months ago
- ☆19Updated 3 months ago
- These are the write up of b3f0re and offical to study☆22Updated 2 years ago
- ☆60Updated 4 months ago
- The learn note of Angr-CTF ..☆49Updated 5 years ago
- Small rust binary analysis helper for IDA.☆80Updated 7 months ago
- ☆287Updated 2 years ago
- A tool for recognizing function symbol☆447Updated 10 months ago
- Web wrapper of niklasb/libc-database☆198Updated 2 months ago
- CTF challenges writeup☆173Updated 2 years ago
- Archive of AAA CTF 2022 (XCTF competition)☆77Updated 3 months ago