A IDAPython script for searching overflows by IDA.
☆21Sep 21, 2017Updated 8 years ago
Alternatives and similar repositories for SearchOverflow
Users that are interested in SearchOverflow are comparing it to the libraries listed below
Sorting:
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆174Jan 29, 2026Updated last month
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆36Jun 21, 2023Updated 2 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆37Feb 6, 2020Updated 6 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Oct 12, 2017Updated 8 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- Build a database of libc offsets to simplify exploitation☆20Apr 23, 2016Updated 9 years ago
- A collection of pwn execrise☆28Oct 31, 2019Updated 6 years ago
- ☆154Oct 30, 2014Updated 11 years ago
- IDA Python Script for anti ollvm-arm☆29Sep 12, 2021Updated 4 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- ☆52Dec 28, 2023Updated 2 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Some IOT Integration of Technical Articles☆190Dec 9, 2022Updated 3 years ago
- ☆31Sep 4, 2022Updated 3 years ago
- ☆17Aug 31, 2014Updated 11 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- A lightweight http server for linux☆17Jun 1, 2025Updated 9 months ago
- ☆97Feb 26, 2020Updated 6 years ago
- ToolSet for VxWorks Based Embedded Device Analyses☆379Sep 24, 2024Updated last year
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- 基于IDAPython的二进制漏洞检测脚本库,对IDA生成的反汇编文件进行静态分析,并以XML形式报告可能存在的漏洞隐患点。Based on the binary vulnerability detection script library of IDAPYTHON, th…☆60Mar 9, 2024Updated 2 years ago
- 放一些乱起八糟的知识点☆27Jul 8, 2020Updated 5 years ago
- Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.☆495May 3, 2021Updated 4 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.☆69Aug 10, 2021Updated 4 years ago
- 我的技术博客,记录成长☆26Jan 30, 2019Updated 7 years ago
- this scanner try to scan some dbbak or ctf #源码泄露☆23Feb 5, 2018Updated 8 years ago
- ☆103Sep 12, 2021Updated 4 years ago
- TRACY☆19Jul 1, 2016Updated 9 years ago
- ☆10Mar 6, 2026Updated 2 weeks ago
- Real firmware fuzz-tested in P2IM paper☆24Dec 11, 2020Updated 5 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- ☆13Sep 22, 2025Updated 5 months ago
- ☆11May 7, 2019Updated 6 years ago
- 内存加载执行golang elf二进制文件☆29Dec 22, 2021Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago