Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: ExploitationExplore 3 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
An advanced cross-platform tool for detecting and exploiting SQL injection security flaws
An advanced cross-platform tool for detecting and exploiting SQL injection security flaws
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
Search gadgets on binaries to facilitate ROP exploitation.