ChrisTheCoolHut / Auto_rop_chain_generationView external linksLinks
☆16Jan 23, 2022Updated 4 years ago
Alternatives and similar repositories for Auto_rop_chain_generation
Users that are interested in Auto_rop_chain_generation are comparing it to the libraries listed below
Sorting:
- ☆13Oct 1, 2020Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Find command injection and format string bugs in binaries☆17Feb 2, 2024Updated 2 years ago
- 一款碾压sqlmap的sql注入漏洞检测系统^^☆16Jan 1, 2021Updated 5 years ago
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 9 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Jul 22, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- LLM powered agents for scanning vulnerabilities on any website - Llama 3 8B, Groq, Selenium, CrewAI, Exa AI☆29Aug 8, 2024Updated last year
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆22May 31, 2023Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- Holistic Greybox Fuzzing of Multi-Language Systems☆27Oct 15, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- MediaTek Fuzzing Workshop in HITCON 2021☆63Apr 28, 2022Updated 3 years ago
- gradient-based symbolic execution engine implemented from scratch☆36Dec 16, 2023Updated 2 years ago
- ☆32Apr 2, 2024Updated last year
- ☆27Apr 27, 2022Updated 3 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Dec 13, 2025Updated 2 months ago
- ☆134May 6, 2024Updated last year
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆22Updated this week
- A browser fuzzer augmented by API mod-ref relations☆35Mar 8, 2024Updated last year
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Jan 26, 2022Updated 4 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆27Nov 28, 2021Updated 4 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Feb 28, 2023Updated 2 years ago