zTrix / magicLinks
WTF are those magic numbers?!!
☆33Updated 3 years ago
Alternatives and similar repositories for magic
Users that are interested in magic are comparing it to the libraries listed below
Sorting:
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Updated 9 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- ☆17Updated 6 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- Full functional idascript with stdin/stdout handled☆20Updated 8 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Updated 6 years ago
- Tool to view heap chunks and memory writes (using pintool)☆43Updated 7 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 9 years ago
- radare2 cLEMENCy plugins☆24Updated 8 years ago
- Tools released in CSS 2019☆38Updated 6 years ago
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Updated 2 years ago
- by http://whereisk0shl.top/☆35Updated 7 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Updated 8 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 6 years ago
- ☆18Updated 6 years ago
- ☆31Updated 5 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Updated 11 years ago
- bctf2017 challenges☆11Updated 8 years ago
- ☆40Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆48Updated 6 years ago
- ☆16Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Updated 9 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- writeup of some ctf challs☆11Updated 7 months ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- BPF Processor for IDA Python☆52Updated 7 years ago