williballenthin / go-reversing
Resources for reverse engineering Go binaries
☆41Updated 9 years ago
Related projects: ⓘ
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- ☆50Updated this week
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- plugin of ida with pin☆48Updated 3 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- ☆20Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆50Updated 11 years ago
- Writeups of CTF challenges I do☆13Updated 4 years ago
- ☆31Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 6 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- A collection for some scripts I used in CTF.☆15Updated 6 years ago
- ☆26Updated 10 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 6 years ago
- IDA PDB Loader☆47Updated 5 years ago
- ☆69Updated this week
- ☆26Updated this week
- ☆28Updated this week
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 5 years ago
- ARM rop chain gadget searcher☆37Updated 6 years ago
- ☆27Updated 9 months ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 4 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆38Updated 6 years ago
- Python based angr plug in for IDA Pro.☆33Updated 6 years ago
- cve-2014-4323 poc☆23Updated 8 years ago
- ☆34Updated this week