ChrisTheCoolHut / ZeratoolView external linksLinks
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
☆1,147Sep 10, 2023Updated 2 years ago
Alternatives and similar repositories for Zeratool
Users that are interested in Zeratool are comparing it to the libraries listed below
Sorting:
- Something about AEG☆272May 29, 2019Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆654Jan 12, 2026Updated last month
- Using Intel's PIN tool to solve CTF problems☆508Apr 12, 2020Updated 5 years ago
- ☆806Feb 5, 2026Updated last week
- ☆1,101Mar 14, 2024Updated last year
- A repository for learning various heap exploitation techniques.☆8,430Jan 15, 2026Updated 3 weeks ago
- The best tool for finding one gadget RCE in libc.so.6☆2,295Feb 3, 2026Updated last week
- Build a database of libc offsets to simplify exploitation☆1,852Oct 23, 2024Updated last year
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,817Jun 8, 2019Updated 6 years ago
- A powerful and user-friendly binary analysis platform!☆8,484Updated this week
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆519Jan 18, 2022Updated 4 years ago
- cwe_checker finds vulnerable patterns in binary executables☆1,317Apr 10, 2025Updated 10 months ago
- Driller: augmenting AFL with symbolic execution!☆965Mar 24, 2025Updated 10 months ago
- awesome list of browser exploitation tutorials☆2,260Sep 18, 2023Updated 2 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆765Jul 25, 2022Updated 3 years ago
- ☆252Mar 13, 2020Updated 5 years ago
- A Coverage Explorer for Reverse Engineers☆2,491Jul 18, 2024Updated last year
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Sep 17, 2020Updated 5 years ago
- A collection of links related to Linux kernel security and exploitation☆6,337Jan 26, 2026Updated 2 weeks ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- the Network Protocol Fuzzer that we will want to use.☆790Jan 29, 2024Updated 2 years ago
- A True Instrumentable Binary Emulation Framework☆5,807Nov 5, 2025Updated 3 months ago
- A fork and successor of the Sulley Fuzzing Framework☆2,308Dec 17, 2025Updated last month
- Backwards program slice stitching for automatic CTF problem solving.☆50Mar 26, 2019Updated 6 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆656Nov 23, 2022Updated 3 years ago
- A JavaScript Engine Fuzzer☆2,140Jan 31, 2026Updated 2 weeks ago
- A collection of links related to VMware escape exploits☆1,487Sep 4, 2024Updated last year
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆556Dec 11, 2023Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,086Feb 28, 2025Updated 11 months ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆647Apr 30, 2019Updated 6 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,275Oct 12, 2022Updated 3 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,045Dec 2, 2025Updated 2 months ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,671Jun 17, 2024Updated last year
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,609Jun 11, 2025Updated 8 months ago
- A docker environment for pwn in ctf☆797Sep 15, 2025Updated 4 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,846Feb 25, 2025Updated 11 months ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago