Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for binary exploitation
binary-exploitation
x
40 search results found
Ropgadget
⭐
3,657
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
Rp
⭐
1,641
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
How2exploit_binary
⭐
446
An in depth tutorial on how to do binary exploitation
Ctfs
⭐
379
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
Ropium
⭐
314
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
Sekiryu
⭐
297
Comprehensive toolkit for Ghidra headless.
Exrop
⭐
164
Automatic ROPChain Generation
Picoctf2021 Writeup
⭐
148
Solutions (that we managed to find) for the 2021 PicoCTF
Hatvenom
⭐
122
HatVenom is a powerful payload generation tool that provides support for all common platforms and architectures.
Ntu Computer Security
⭐
76
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Heappy
⭐
67
A happy heap editor to support your exploitation process 🙂
Pwnpad
⭐
60
🐳 VMs are bloat. Dockerise your CTF environment.
Scuffed_low_level_stash
⭐
58
Stash for Binary Exploitation and Reverse Engineering Resources
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Pwnscripts
⭐
51
Very simple script(s) to hasten binary exploit creation
Cj2018 Final Ctf
⭐
47
Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.
Binary Exploitation
⭐
45
Good to know, easy to forget information about binaries and their exploitation!
Autogdb
⭐
37
AutoGDB: Combining Large Language models and GDB (Dynamic debugging tool) to automatic binary vulnerability hunting and exploitations
All In One Cybersecurity Resources
⭐
36
List of CyberSecurity Resources and some different Sub-Sets of CyberSecurity
Hackthebox
⭐
33
My WriteUps for HackTheBox CTF, Machines, and Sherlocks.
Writeup_factorio
⭐
33
Writeup of a remote code execution in Factorio by supplying a modified save file.
Ropchain
⭐
27
ROPChain generator.
Ctf Write Up
⭐
22
TEAM BAY'S CTF WRITE UP
Ctf
⭐
21
CTF programs and writeups
Practical Malware Analysis
⭐
20
This repository has everything I have learnt so far while reading the book Practical Malware Analysis
Picoctf 2023 Writeup
⭐
20
Write up of solutions to the picoCTF 2023 capture the flag (CTF) event from my submissions during the competition.
Ctf Writeups
⭐
17
📚 Yet another CTF writeups repository. PWN and RE tasks
Exploit Me
⭐
16
Exploit development challenges!
Riceteacatpanda
⭐
16
repo with challenge material for riceteacatpanda (2020)
Src
⭐
13
This is the source of our Return Oriented Programming tool.
Pe Codecaving
⭐
12
Work files for my blog post "Code Caving in a PE file.
Pwndocker
⭐
10
The python + docker tool that provides Ubuntu environments(16.04~20.04) for the CTF players' convenience
Sunshinectf 2019 Public
⭐
10
Repository of challenges for SunshineCTF 2019
Exim Rce Cve 2018 6789
⭐
8
This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.
Picoctf 2023 Writeup
⭐
8
Write up of some solutions to the picoCTF 2023 from my submissions during the competition
Binary_dissection_course
⭐
8
This repository is a tutorial which aims at going through practical dissection and analysis in the world of binaries.
Eeva
⭐
8
E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android
Snake_apple
⭐
7
The code repository for the Snake&Apple article series.
Moria
⭐
6
Python library for interacting with in-memory C structures using data mined from binary DWARF debug info.
Mem Attacks Example
⭐
5
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
1-40 of 40 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.