zachriggle / pedaLinks
PEDA - Python Exploit Development Assistance for GDB
☆97Updated 8 years ago
Alternatives and similar repositories for peda
Users that are interested in peda are comparing it to the libraries listed below
Sorting:
- GATEKEEPER: Inline and on-target defense☆121Updated 2 years ago
- A light ELF binary patch tool in python urwid☆147Updated 5 years ago
- 2016 DEF CON Qualifier Challenges☆179Updated 9 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- Repository to train/learn memory corruption on the ARM platform.☆355Updated 8 years ago
- ☆159Updated 10 years ago
- A collection of more than 1000 binary libc files☆88Updated 10 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- add symbols back into a stripped ELF binary (~strip)☆173Updated 7 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- Cross Architecture Shellcode in C☆202Updated 8 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆291Updated 7 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- Simplify format string exploitation.☆340Updated 3 years ago
- CTF writeups☆113Updated 7 years ago
- Radare Congress Stuff☆212Updated 7 months ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 7 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- afl-fuzz for javascript☆205Updated 8 years ago
- ☆138Updated 3 years ago
- Fentanyl is an IDAPython script that makes patching significantly easier☆211Updated 2 years ago
- Binary Ninja plugin for Voltron integration☆164Updated 7 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆37Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆134Updated 9 years ago
- ☆105Updated 10 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Updated 2 years ago