ylcangel / exploit
Summary of binary vulnerability mining techniques
☆32Updated 5 years ago
Alternatives and similar repositories for exploit:
Users that are interested in exploit are comparing it to the libraries listed below
- 基于angr的污点分析引擎☆39Updated 5 years ago
- Some CVE resources☆26Updated 5 years ago
- 逆向小红伞杀毒软件驱动——avkmgr☆70Updated 7 years ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 6 years ago
- ☆80Updated 6 years ago
- linux system call hook framework☆47Updated 6 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆9Updated last month
- 应急响应实战笔记,一个安全工程师的自我修养。☆20Updated 5 years ago
- Same code , different CPU case , different build case , Iot bins reverse learning.☆26Updated 8 years ago
- ☆48Updated 6 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 7 years ago
- IDA plugin for COM☆47Updated 2 years ago
- Mobile Security Keynote☆33Updated 6 years ago
- 笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包…☆77Updated 3 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆34Updated 4 years ago
- CTF pwn工具,一个快速搭建任何版本环境的工具、使用chroot具备环境隔离、ida自动加载DWARF、被调试程序输入输出重定向等功能☆15Updated 4 years ago
- IoT Security Papers☆48Updated 5 years ago
- Windows Security Resources☆65Updated 3 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆14Updated 2 years ago
- 过去写的一些Windows安全研究相关代码☆136Updated 6 years ago
- Useful tools for writing shellcode☆67Updated 4 years ago
- ida提取特征码脚本☆55Updated 5 years ago
- 关于intel和amd指令行为不一样这件事☆61Updated 2 years ago
- Fuzzing SILK with AFL☆25Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 3 years ago
- hutrace☆24Updated 2 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Updated 8 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- ☆29Updated 6 years ago
- IDA_Signsrch in Python☆102Updated 4 years ago