ylcangel / exploitLinks
Summary of binary vulnerability mining techniques
☆32Updated 5 years ago
Alternatives and similar repositories for exploit
Users that are interested in exploit are comparing it to the libraries listed below
Sorting:
- 基于angr的污点分析引擎☆39Updated 6 years ago
- CTF pwn工具,一个快速搭建任何版本环境的工具、使用chroot具备环境隔离、ida自动 加载DWARF、被调试程序输入输出重定向等功能☆15Updated 4 years ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 6 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆9Updated 4 months ago
- Some CVE resources☆26Updated 5 years ago
- ☆80Updated 7 years ago
- linux system call hook framework☆47Updated 6 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 7 years ago
- Mobile Security Keynote☆33Updated 6 years ago
- Useful tools for writing shellcode☆68Updated 5 years ago
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆81Updated 4 years ago
- Same code , different CPU case , different build case , Iot bins reverse learning.☆28Updated 8 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆14Updated 2 years ago
- 搜集的一些kernel paper☆25Updated 5 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 5 years ago
- 作为博客☆11Updated 5 years ago
- 逆向小红伞杀毒软件驱动——avkmgr☆70Updated 7 years ago
- 关于intel和amd指令行为不一样这件事☆61Updated 3 years ago
- ☆9Updated 4 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆34Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 7☆16Updated 7 years ago
- ida提取特征码脚本☆56Updated 5 years ago
- 应急响应实战笔记,一个安全工程师的自我修养。☆20Updated 6 years ago
- IDA plugin for COM☆48Updated 2 years ago
- ☆49Updated 6 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 7 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- Fuzzing SILK with AFL☆25Updated 5 years ago
- 软件逆向☆60Updated 10 years ago
- Yet Another Golang binary parser for IDAPro☆45Updated 5 months ago