wtdcode / mytalks
PPT of my talks.
☆11Updated 3 years ago
Alternatives and similar repositories for mytalks:
Users that are interested in mytalks are comparing it to the libraries listed below
- Sample Binary Ninja Plugin☆21Updated last year
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 7 months ago
- Ditto.☆17Updated 4 years ago
- ARMv7 architecture plugin☆40Updated last year
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- IDA (sort of) headless☆24Updated last year
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- A Linux x86_64 ELF loader in user-space written in Rust☆38Updated 4 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- ☆33Updated 2 years ago
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆11Updated 7 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆26Updated 5 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- ☆18Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- ☆31Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆15Updated 4 years ago
- Another (bad) ROP gadget finder, but this time in Rust☆20Updated last year
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Updated 5 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- ☆14Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- BPF Processor for IDA Python☆51Updated 6 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year