zardus / deadbeefLinks
The deadbeef module produces hexspeak for nefarious purposes.
☆9Updated 9 years ago
Alternatives and similar repositories for deadbeef
Users that are interested in deadbeef are comparing it to the libraries listed below
Sorting:
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- ☆12Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Vagrant files to bootstrap VM for CTFs☆11Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- CTF exploit development and other tools of pwnage☆21Updated 6 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Static Php Analysis and Fuzzer☆26Updated 11 years ago
- ☆26Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 4 months ago
- ELF header abuse☆48Updated 9 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Application Security library☆11Updated 12 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Updated 10 years ago
- finals-2014☆21Updated 8 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 2 years ago
- PyCommands for Immunity Debugger☆28Updated 12 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- Yet another IDA Pro real time syncing plugin☆16Updated 7 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- Routines for hunting down kernel structs.☆41Updated 13 years ago