All Projects → CodeMaxx → Binary Exploitation

CodeMaxx / Binary Exploitation

Good to know, easy to forget information about binaries and their exploitation!

Programming Languages

assembly
5116 projects

Projects that are alternatives of or similar to Binary Exploitation

xgadget
Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-29.79%)
Mutual labels:  binary, x86, exploitation
bmod
bmod parses binaries for modification/patching and disassembles machine code sections.
Stars: ✭ 12 (-74.47%)
Mutual labels:  binary, x86-64, x86
Karkinos
A thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (+261.7%)
Mutual labels:  binary, ctf, exploitation
how-to-exploit-a-double-free
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Stars: ✭ 1,165 (+2378.72%)
Mutual labels:  binary, ctf, exploitation
Rop Tool
A tool to help you write binary exploits
Stars: ✭ 590 (+1155.32%)
Mutual labels:  x86, x86-64
The holy book of x86
A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS....
Stars: ✭ 577 (+1127.66%)
Mutual labels:  x86, x86-64
Squalr
Squalr Memory Editor - Game Hacking Tool Written in C#
Stars: ✭ 645 (+1272.34%)
Mutual labels:  x86, x86-64
X86 Assembly Cheat
MOVED TO: https://github.com/cirosantilli/linux-kernel-module-cheat#userland-assembly SEE README. x86 IA-32 and x86-64 userland minimal examples tutorial. Hundreds of runnable asserts. Nice GDB setup. IO done with libc, so OS portable in theory. NASM and GAS covered. Tested in Ubuntu 18.04. Containers (ELF), linking, calling conventions. System land cheat at: https://github.com/cirosantilli/x86-bare-metal-examples, ARM cheat at: https://github.com/cirosantilli/arm-assembly-cheat
Stars: ✭ 773 (+1544.68%)
Mutual labels:  x86, x86-64
Pwndra
A collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+787.23%)
Mutual labels:  ctf, exploitation
Exploit me
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (+1314.89%)
Mutual labels:  ctf, exploitation
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+1600%)
Mutual labels:  ctf, exploitation
Capstone
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Stars: ✭ 5,374 (+11334.04%)
Mutual labels:  x86, x86-64
Mbe
Course materials for Modern Binary Exploitation by RPISEC
Stars: ✭ 4,674 (+9844.68%)
Mutual labels:  ctf, exploitation
Remill
Library for lifting of x86, amd64, and aarch64 machine code to LLVM bitcode
Stars: ✭ 633 (+1246.81%)
Mutual labels:  x86, x86-64
Unicorn
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, X86)
Stars: ✭ 4,934 (+10397.87%)
Mutual labels:  x86, x86-64
Arm now
arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse, exploit, fuzzing and programming purpose.
Stars: ✭ 719 (+1429.79%)
Mutual labels:  x86, x86-64
Beelzebub
The Lord of Flies - A hobby operating system
Stars: ✭ 24 (-48.94%)
Mutual labels:  x86, x86-64
Distorm
Powerful Disassembler Library For x86/AMD64
Stars: ✭ 829 (+1663.83%)
Mutual labels:  x86, x86-64
Write Ups
📚 VoidHack CTF write-ups
Stars: ✭ 45 (-4.26%)
Mutual labels:  ctf, exploitation
Reko
Reko is a binary decompiler.
Stars: ✭ 942 (+1904.26%)
Mutual labels:  x86, x86-64

Binary-Exploitation

This repo contains details about the working of binaries and techniques of binary exploitation I come across while doing CTFs or studying in general. This includes stuff like x87 instruction, shellshock attack pattern, common code bugs etc.

It also contains commonly used(but easily forgotten) commands for stuff like linking, extracting shellcode from executables, extracting GOT addresses etc.

This is my goto place when working on CTF challenges.

Another file read.md contains some nice resources/research papers for reading.

PRs are welcome 😄

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].