Boyan-MILANOV / ropiumLinks
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
☆387Updated 2 years ago
Alternatives and similar repositories for ropium
Users that are interested in ropium are comparing it to the libraries listed below
Sorting:
- A Binary Ninja plugin for vulnerability research.☆296Updated last year
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆305Updated last year
- repository for kernel exploit practice☆410Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆201Updated 5 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆336Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- Using Intel's PIN tool to solve CTF problems☆500Updated 5 years ago
- ☆720Updated last month
- Linux Heap Exploitation Practice☆391Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆231Updated 4 years ago
- Basic pwntools for Windows☆267Updated 2 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 3 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆761Updated 3 years ago
- Binary code coverage visualizer plugin for Ghidra☆295Updated last year
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆514Updated 5 months ago
- 🔍Heap analysis tool for CTF pwn.☆224Updated 4 years ago
- Use angr in Ghidra☆610Updated last year
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆340Updated 6 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆387Updated 2 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆262Updated 2 months ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆520Updated last year
- How to build an efficient pwn development environment in 2020☆266Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆303Updated 2 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆435Updated 6 months ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆280Updated 5 years ago
- A comprehensive binary emulation and instrumentation platform.☆416Updated 2 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆308Updated 6 years ago
- Automatic ROPChain Generation☆293Updated 5 years ago