wanda-phi / cpuadventure2Links
CPU Adventure 2 challenge from the Dragon CTF 2019
☆16Updated 8 months ago
Alternatives and similar repositories for cpuadventure2
Users that are interested in cpuadventure2 are comparing it to the libraries listed below
Sorting:
- Launch radare2 like a boss from pwntools in tmux☆23Updated 6 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 6 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Updated 6 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Updated 6 years ago
- ☆49Updated 7 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Updated 6 years ago
- SD/MMC Analyzer for Saleae Logic☆39Updated last year
- Slides and stuffs of the meetings during the 2019☆33Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Basic BIOS emulator for Unicorn Engine.☆101Updated 4 years ago
- Tasteless CTF 2019☆20Updated 6 years ago
- Use Ghidra Structs in Python☆30Updated 4 years ago
- Ghidra plugin to communicate with radare2☆68Updated 2 months ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- ☆28Updated 6 years ago
- python and honggfuzz☆26Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Migrated to Codeberg☆46Updated 5 years ago
- My open source Ghidra scripts☆48Updated 6 years ago
- ☆21Updated last year
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago