☆16Oct 12, 2018Updated 7 years ago
Alternatives and similar repositories for mips_exploit
Users that are interested in mips_exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- writeups for Capture The Flag Competitions☆16May 31, 2022Updated 3 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- ☆20May 27, 2020Updated 5 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- Dockerized Cuckoo build☆10Aug 3, 2016Updated 9 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Resources related to GitHub Security Lab☆15May 7, 2021Updated 4 years ago
- 自己实现的一个socks5服务端程序(目前仅支持tcp)☆13Feb 5, 2018Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Oct 29, 2013Updated 12 years ago
- 防溯源利器之ztor代理(自定义秒级更换IP)☆14Feb 23, 2024Updated 2 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Sep 12, 2021Updated 4 years ago
- Basic Block Trace: DynamoRIO client☆29Dec 19, 2021Updated 4 years ago
- Windows全版本提权脚本☆32Mar 3, 2021Updated 5 years ago
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Mar 23, 2020Updated 6 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆174Jan 29, 2026Updated last month
- Asynchronous Bittorrent Client written in C☆16Feb 13, 2024Updated 2 years ago
- ESP32 Remote JTAG Host for programming FPGAs☆29Sep 28, 2020Updated 5 years ago
- rotating proxy server☆11Sep 17, 2024Updated last year