HackOvert / awesome-bugsLinks
A collection of software bug types and articles showcasing the hunt for and exploitation of them.
☆20Updated 4 years ago
Alternatives and similar repositories for awesome-bugs
Users that are interested in awesome-bugs are comparing it to the libraries listed below
Sorting:
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semanticall…☆27Updated 3 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆25Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated last week
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆32Updated 5 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆36Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆11Updated 7 years ago
- AIL: The angr Intermediate Language.☆32Updated last week
- Linux kernel branches for confidential compute research☆17Updated 2 months ago
- Dr. Disassembler☆35Updated 3 years ago
- First level taint implementation with qemu for linux user mode☆29Updated 4 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- Debugger and analyzer for ARM ELF executables.☆19Updated 2 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 3 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- Superion Mutator for AFLPlusPlus☆31Updated last year
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- LLVM based devirtualization PoC’s.☆20Updated 3 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆25Updated 5 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago