zachriggle / pwntools-glibc-bufferingView external linksLinks
☆16Dec 28, 2016Updated 9 years ago
Alternatives and similar repositories for pwntools-glibc-buffering
Users that are interested in pwntools-glibc-buffering are comparing it to the libraries listed below
Sorting:
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago
- Python repository containing parsed standard C library function and argument information☆29Oct 3, 2018Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- Some loader module for IDA☆35Feb 21, 2017Updated 8 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 5 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- C standard library and communication layer for the Supercard DSTwo☆14Sep 29, 2017Updated 8 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Go module for https://github.com/celo-org/bls-zexe/☆13Feb 2, 2024Updated 2 years ago
- send me some eth, how bout dat?☆13Feb 17, 2019Updated 6 years ago
- The Web interface mimics virtual terminal environment☆16May 6, 2013Updated 12 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- Simple tool to help bruteforce your Ethereum keystore passphrase☆10May 23, 2017Updated 8 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆12Jan 7, 2025Updated last year
- `penv`: a better `env` & `venv`☆12May 24, 2017Updated 8 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- Re-codesigning tool for iOS ipa file☆11Dec 31, 2012Updated 13 years ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆15Feb 1, 2026Updated 2 weeks ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Get the IP adresses of Bittorrent Peers☆13Oct 14, 2016Updated 9 years ago
- ☆10Feb 7, 2020Updated 6 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- This repo contains materials from Just Hit the Core CTF team workshops organized thanks to KNI Kernel at AGH University of Science and Te…☆11Jan 10, 2018Updated 8 years ago