Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
☆1,146Sep 10, 2023Updated 2 years ago
Alternatives and similar repositories for Zeratool
Users that are interested in Zeratool are comparing it to the libraries listed below
Sorting:
- Something about AEG☆272May 29, 2019Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆655Jan 12, 2026Updated last month
- Using Intel's PIN tool to solve CTF problems☆507Apr 12, 2020Updated 5 years ago
- ☆810Feb 5, 2026Updated last month
- ☆1,106Mar 14, 2024Updated last year
- A repository for learning various heap exploitation techniques.☆8,450Jan 15, 2026Updated last month
- The best tool for finding one gadget RCE in libc.so.6☆2,301Feb 26, 2026Updated last week
- Build a database of libc offsets to simplify exploitation☆1,853Oct 23, 2024Updated last year
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- A powerful and user-friendly binary analysis platform!☆8,517Updated this week
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆520Jan 18, 2022Updated 4 years ago
- cwe_checker finds vulnerable patterns in binary executables☆1,324Apr 10, 2025Updated 10 months ago
- Driller: augmenting AFL with symbolic execution!☆965Mar 24, 2025Updated 11 months ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆765Jul 25, 2022Updated 3 years ago
- awesome list of browser exploitation tutorials☆2,266Sep 18, 2023Updated 2 years ago
- ☆252Mar 13, 2020Updated 5 years ago
- A Coverage Explorer for Reverse Engineers☆2,505Feb 14, 2026Updated 3 weeks ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆479Sep 17, 2020Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- A collection of links related to Linux kernel security and exploitation☆6,353Jan 26, 2026Updated last month
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- A True Instrumentable Binary Emulation Framework☆5,827Nov 5, 2025Updated 4 months ago
- A fork and successor of the Sulley Fuzzing Framework☆2,316Feb 15, 2026Updated 2 weeks ago
- Backwards program slice stitching for automatic CTF problem solving.☆50Mar 26, 2019Updated 6 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- A JavaScript Engine Fuzzer☆2,161Updated this week
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆560Dec 11, 2023Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,098Feb 28, 2025Updated last year
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,276Oct 12, 2022Updated 3 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,080Dec 2, 2025Updated 3 months ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,615Jun 11, 2025Updated 8 months ago
- A docker environment for pwn in ctf☆803Sep 15, 2025Updated 5 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,850Feb 25, 2025Updated last year
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Jul 22, 2020Updated 5 years ago