williballenthin / go-reversing
Resources for reverse engineering Go binaries
☆41Updated 10 years ago
Alternatives and similar repositories for go-reversing:
Users that are interested in go-reversing are comparing it to the libraries listed below
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- plugin of ida with pin☆48Updated 4 years ago
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago
- ☆20Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- ☆31Updated 7 years ago
- ☆24Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Updated 11 years ago
- Windows builds for use with angr framework☆29Updated 9 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆140Updated 10 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- ☆33Updated 9 years ago
- Collection of pin tools☆51Updated 9 years ago
- ☆100Updated 6 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- A collection for some scripts I used in CTF.☆15Updated 6 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆74Updated 6 years ago
- Random stuff for FlareOn☆13Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Updated 8 years ago