Boyan-MILANOV / ropium
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
☆384Updated 2 years ago
Alternatives and similar repositories for ropium:
Users that are interested in ropium are comparing it to the libraries listed below
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆301Updated 7 months ago
- A Binary Ninja plugin for vulnerability research.☆289Updated 6 months ago
- Linux Heap Exploitation Practice☆378Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆226Updated 4 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆603Updated last year
- repository for kernel exploit practice☆396Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- ☆655Updated last month
- Cross Platform Kernel Fuzzer Framework☆451Updated 6 years ago
- Using Intel's PIN tool to solve CTF problems☆497Updated 4 years ago
- Binary code coverage visualizer plugin for Ghidra☆289Updated 8 months ago
- Use angr in Ghidra☆574Updated 7 months ago
- Winnie makes fuzzing Windows applications easy☆552Updated 2 years ago
- ☆283Updated 4 years ago
- Basic pwntools for Windows☆261Updated last year
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆340Updated 4 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆334Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆385Updated last year
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆472Updated 8 months ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆745Updated 2 years ago
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆453Updated last year
- Fuzzing the Kernel Using Unicornafl and AFL++☆297Updated 2 years ago
- Automatic ROPChain Generation☆284Updated 5 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆502Updated last month
- Collaborative Reverse Engineering plugin for IDA Pro & Hex-Rays☆661Updated 4 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆436Updated 11 months ago
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆275Updated 4 years ago
- A collection of pwn/CTF related utilities for Ghidra☆667Updated 6 months ago