zxgio / gdb_gef-cheatsheetView external linksLinks
GDB + GEF cheatsheet for reversing binaries
☆74Sep 24, 2023Updated 2 years ago
Alternatives and similar repositories for gdb_gef-cheatsheet
Users that are interested in gdb_gef-cheatsheet are comparing it to the libraries listed below
Sorting:
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- A static binary rewriter that does not use heuristics☆308May 17, 2018Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- FRAPL Framework☆152Dec 26, 2016Updated 9 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆19Jun 14, 2018Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- load iOS12 kernelcaches and PAC code in IDA☆60Oct 4, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Jul 4, 2018Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Nov 4, 2021Updated 4 years ago
- Example showing how to use Frida for standalone injection of a custom payload☆167May 26, 2020Updated 5 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Feb 15, 2023Updated 2 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆215Sep 17, 2021Updated 4 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- ☆17Jun 30, 2020Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Nov 4, 2019Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Jun 27, 2018Updated 7 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year