hacktribe
pwndbg
Our great sponsors
hacktribe | pwndbg | |
---|---|---|
15 | 9 | |
164 | 6,700 | |
- | 3.8% | |
5.6 | 9.5 | |
20 days ago | 4 days ago | |
Jupyter Notebook | Python | |
GNU Affero General Public License v3.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hacktribe
- New firmware for Electribe2 in development.
-
On the e2s, can the type of effect be selected through midi cc? or do I need to upgrade to hacktribe?
A real oversight by korg. I just looked on the Hacktribe discussion forum on github and found someone asking about changing the oscillator through midi. The guy who's making the new firmware says he plans on adding this feature. https://github.com/bangcorrupt/hacktribe/discussions/243
-
need help with korg electribe 2 sampler red
Just have a look at this repo: https://github.com/bangcorrupt/hacktribe/wiki/debrick
-
my first electribe jam
If you want access to the synths from the non-sampler version, check this out. https://github.com/bangcorrupt/hacktribe
-
What does it take to hack and re-engineer an Electribe? I asked bangcorrupt, the creator of the HackTribe project.
If you haven't got lots of own samples loaded, you can already go ahead, provided you know how to run Python on your computer: Export the factory samples by booting without SD card, and then, use the DATA UTILITY menu to export an e2sSample.all sample dump and .e2sallpat pattern dump. Use an editor like Oe2sSLE to move all factory samples to new slots starting from 519-921 (I use exactly 500 slots up, this way it is easier to look them up). A Python script called e2pat_shift.py in bangcorrupt's repository takes your pattern dump and changes all sample references in the pattern by 500.
- Do i really have to reload the samples every time i start my electribe one by one?
-
I know there already many many posts comparing the different Electribes, but somehow after reading (most of) them all I just have 30 tabs open and as confused as ever.. please help!!! Electribe Sampler 2 vs Synth 2 vs an earlier model?!? What to go for!!
Doesn't really matter. Get a grey one and mod it with the custom firmware. Then you have both: https://github.com/bangcorrupt/hacktribe - there's a page with demo videos if that interests you.
-
Hacktribe Acid
I posted this one over at r/synthesizers as well but thought it fit well here. First track since switching to the Hacktribe firmware. https://github.com/bangcorrupt/hacktribe So far I am loving the extended features so much more than the original. The ability to have all the synth parts as well as being able to record and load my own samples has completely changed this unit for me.
-
Acid on the Hacktribe
It is a modded firmware https://github.com/bangcorrupt/hacktribe. Rather than swapping to the sampler os this has the functionality to both. So far I am loving it!
-
Hacktribe differences between Sampler and Synth
Yes, the E2S gets the missing filter models from the E2 with the Hacktribe updates. The E2S misses a load of synth models from the E2 - compare the OSC parameter lists for E2 and E2S - and the Hacktribe brings them back, together with the other E2 filter models. I won't guarantee that really ALL of the OSC models from the original E2 come along for the ride, but looking at Hacktribe's feature list, it looks pretty comprehensive.
pwndbg
-
Any tips for newish C debugging please.
By far the best debugger for C is gdb+pwndbg (https://github.com/pwndbg/pwndbg)
- Need help installing pwndbg on Kali Linux
-
Hacked GDB Dashboard Puts It All on Display
There are a lot of these types of tools already in the reverse engineering community (in order of lowest chance of breaking when you throw really weird stuff at it):
GEF: https://gef.readthedocs.io/en/master/
PWNDBG: https://github.com/pwndbg/pwndbg
PEDA: https://github.com/longld/peda
They also come with a slew of different features to aid in RE/exploit dev, but many of them are also useful for debugging really weird issues.
-
Debugging with GDB
GDB is great. I definitely recommend checking out watchpoints as well, a very useful tool for monitoring how a variable changes over time.
GDB also has many good plugins - pwndbg has tons of features and UI improvements over stock GDB.
https://github.com/pwndbg/pwndbg
-
Making GDB Easier: The TUI Interface
I've recently started a new semester for my Master's program, and the first project for the semester involves using the GDB tool (GNU Debugger) to analyze a stack on a simple C program that contains a buffer overflow vulnerability. A couple of semesters ago, I had been given a VM pre-loaded with a more featured debugger tool called pwndbg. Pwndbg was excellent because it was easy to use and easily allowed accessed to information such as current assembly code being executed and a view of the program registers. So, going back to using GDB felt a little like stepping back into the stone age.
-
Awesome CTF : Top Learning Resource Labs
Pwndbg - A GDB plugin that provides a suite of utilities to hack around GDB easily.
- Trouble downloading pwndbg
-
Problem in downloading pwndbg
i have peda installed on my gdb and now i am trying to install pwndbg with git clone https://github.com/pwndbg/pwndbg cd pwndbg ./setup.sh
What are some alternatives?
webaudiofont - Use full GM set of musical instruments to play MIDI and single sounds or effects. Support for reverberation and equaliser. No plugins, no Flash. Pure HTML5 implementation compatible with desktop and mobile browser. See live examples.
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
natural-synth - Open-Source IoT-based Digital Hardware and Software Synthesizer (Arduino, Raspberry Pi, Flask)
peda - PEDA - Python Exploit Development Assistance for GDB
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
pwntools - CTF framework and exploit development library
r_e_c_u_r - an open diy py/pi based video sampler
gdb-dashboard - Modular visual interface for GDB in Python
hack-handler-happstack
one_gadget - The best tool for finding one gadget RCE in libc.so.6
Ghost - Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
voltron - A hacky debugger UI for hackers