zachriggle / pwntools-glibc-bufferingView external linksLinks
☆16Dec 28, 2016Updated 9 years ago
Alternatives and similar repositories for pwntools-glibc-buffering
Users that are interested in pwntools-glibc-buffering are comparing it to the libraries listed below
Sorting:
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- Python repository containing parsed standard C library function and argument information☆29Oct 3, 2018Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- cracked☆32Jan 15, 2021Updated 5 years ago
- Some loader module for IDA☆35Feb 21, 2017Updated 8 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 5 years ago
- C standard library and communication layer for the Supercard DSTwo☆14Sep 29, 2017Updated 8 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Software Exploitation☆11Sep 22, 2025Updated 4 months ago
- Presentations, Videos, and Sample Source from Austin LLVM Meetups☆11Jul 23, 2020Updated 5 years ago
- This repo contains materials from Just Hit the Core CTF team workshops organized thanks to KNI Kernel at AGH University of Science and Te…☆11Jan 10, 2018Updated 8 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Get the IP adresses of Bittorrent Peers☆13Oct 14, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- ☆12Aug 13, 2014Updated 11 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- Detect if running in a VM or on real hardware☆14Aug 23, 2014Updated 11 years ago
- Re-codesigning tool for iOS ipa file☆11Dec 31, 2012Updated 13 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- The Web interface mimics virtual terminal environment☆16May 6, 2013Updated 12 years ago
- `penv`: a better `env` & `venv`☆12May 24, 2017Updated 8 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆12Jan 7, 2025Updated last year
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Create presentation with react component.☆10Dec 12, 2016Updated 9 years ago
- Format string exploitation helper☆46Nov 16, 2015Updated 10 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago
- Nintendo Entertainment System (NES) ROM loader module for IDA Pro (for IDA 4.9)☆51Feb 26, 2020Updated 5 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- ☆12Mar 23, 2019Updated 6 years ago