☆16Jan 23, 2022Updated 4 years ago
Alternatives and similar repositories for Auto_rop_chain_generation
Users that are interested in Auto_rop_chain_generation are comparing it to the libraries listed below
Sorting:
- ☆13Oct 1, 2020Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- 一款碾压sqlmap的sql注入漏洞检测系统^^☆16Jan 1, 2021Updated 5 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Jul 22, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Jul 11, 2020Updated 5 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆29Aug 8, 2024Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Holistic Greybox Fuzzing of Multi-Language Systems☆27Oct 15, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- MediaTek Fuzzing Workshop in HITCON 2021☆63Apr 28, 2022Updated 3 years ago
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- ☆27Apr 27, 2022Updated 3 years ago
- ☆32Apr 2, 2024Updated last year
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Dec 13, 2025Updated 2 months ago
- ☆134May 6, 2024Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- A browser fuzzer augmented by API mod-ref relations☆35Mar 8, 2024Updated last year
- Seed Corpus for clamav-devel oss-fuzz integration.☆34Jul 30, 2019Updated 6 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆27Nov 28, 2021Updated 4 years ago