Highlights
Starred repositories
UNIX-like reverse engineering framework and command-line toolset
Espressif IoT Development Framework. Official development framework for Espressif SoCs.
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Course materials for Modern Binary Exploitation by RPISEC
canonical libwebsockets.org networking library
Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)
Exercises to learn how to fuzz with American Fuzzy Lop
Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Vulnerable server used for learning software exploitation
A fast, parallel test case minimization tool.
AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)
Cross-platform instrumentation and introspection library written in C
Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)
Redirects the standard usbmuxd socket to allow connections to local and remote usbmuxd instances so remote devices appear connected locally.
Exercises for learning Reverse Engineering and Exploitation.
The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.
A dummy allocator ptmalloc-inspired that we use to introduce n00bs to heap exploitation