A IDAPython script for searching overflows by IDA.
☆21Sep 21, 2017Updated 8 years ago
Alternatives and similar repositories for SearchOverflow
Users that are interested in SearchOverflow are comparing it to the libraries listed below
Sorting:
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆36Feb 6, 2020Updated 6 years ago
- Build a database of libc offsets to simplify exploitation☆20Apr 23, 2016Updated 9 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Oct 12, 2017Updated 8 years ago
- ☆153Oct 30, 2014Updated 11 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆36Jun 21, 2023Updated 2 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆16Aug 7, 2019Updated 6 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- ☆15Feb 1, 2020Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- 我的技术博客,记录成长☆25Jan 30, 2019Updated 7 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Nov 12, 2018Updated 7 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 7 years ago
- ToolSet for VxWorks Based Embedded Device Analyses☆375Sep 24, 2024Updated last year
- Some IOT Integration of Technical Articles☆191Dec 9, 2022Updated 3 years ago
- AFLplusplus + libprotobuf-mutator = love☆85Jan 19, 2020Updated 6 years ago
- 基于IDAPython的二进制漏洞检测脚本库,对IDA生成的反汇编文件进行静态分析,并以XML形式报告可能存在的漏洞隐患点。Based on the binary vulnerability detection script library of IDAPYTHON, th…☆60Mar 9, 2024Updated last year
- IDA Python Script for anti ollvm-arm☆29Sep 12, 2021Updated 4 years ago
- Binary Ninja plugin suite for SEGA Genesis ROM hacking☆27Nov 4, 2024Updated last year
- this scanner try to scan some dbbak or ctf #源码泄露☆23Feb 5, 2018Updated 8 years ago
- 内存加载执行golang elf二进制文件☆29Dec 22, 2021Updated 4 years ago
- ☆103Sep 12, 2021Updated 4 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆422Sep 18, 2021Updated 4 years ago
- ☆52Dec 28, 2023Updated 2 years ago
- ☆31Sep 4, 2022Updated 3 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- 基于burpsuite headless 的代理式被动扫描系统☆95Feb 10, 2020Updated 6 years ago
- software vulnerabilities☆24Apr 3, 2019Updated 6 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Mar 15, 2023Updated 2 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- My fuzzing workshop from PHDays9☆26May 24, 2019Updated 6 years ago