ColdHeat / liil
Linear IL view for Binary Ninja
☆14Updated 8 years ago
Alternatives and similar repositories for liil:
Users that are interested in liil are comparing it to the libraries listed below
- Plugin for binary ninja to centralize features useful in static analysis.☆15Updated 5 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆47Updated 8 years ago
- AFL "mostly" ported to cygwin☆26Updated 9 years ago
- ☆12Updated 7 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- exploit development☆49Updated 7 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆26Updated 13 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆26Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Challenge for the 33C3 CTF☆15Updated 8 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- ☆26Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- A Modern Approach☆10Updated 9 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- ☆33Updated 9 years ago
- covFuzz☆34Updated 7 years ago