zachriggle / pwndbg
Exploit Development and Reverse Engineering with GDB Made Easy
☆37Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for pwndbg
- Arm Episodes☆78Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆146Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- r2con 2017 September 6-9☆97Updated 7 years ago
- ☆91Updated 5 years ago
- Make ARM Shellcode Great Again☆61Updated 3 years ago
- A GUI-based USB device fuzzer☆60Updated 7 years ago
- ☆49Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated 3 months ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 6 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- ☆157Updated 7 years ago
- ☆50Updated 11 years ago
- Library for creating CTF services.☆75Updated 8 years ago
- Routines for hunting down kernel symbols.☆81Updated 13 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆85Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆54Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- ☆138Updated 6 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 7 years ago