checksec tool for win10
☆25Aug 21, 2017Updated 8 years ago
Alternatives and similar repositories for checksec-win
Users that are interested in checksec-win are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Nov 29, 2021Updated 4 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 4 years ago
- ☆17May 13, 2019Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- ELF parser library implemented in pure Ruby!☆46Nov 1, 2025Updated 4 months ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- A site to easily decode the content of Rails sessions stored in cookies.☆16Jan 26, 2014Updated 12 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- Experimental Java agent to stomp on things.☆15Feb 10, 2019Updated 7 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Another plugin for CRLF vulnerability detection☆25Jan 25, 2017Updated 9 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- Packages for IDA Pro (written in python but supports all)☆133Jan 4, 2021Updated 5 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Aug 8, 2017Updated 8 years ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆214Sep 17, 2021Updated 4 years ago
- ☆25Mar 18, 2018Updated 8 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- IDA Pro loader and processor modules for WebAssembly☆371Oct 4, 2018Updated 7 years ago