I am still working on it
☆12Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for AEG
Users that are interested in AEG are comparing it to the libraries listed below
Sorting:
- ☆28Apr 18, 2024Updated last year
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 3 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Semantic Crash Bucketing☆16Sep 8, 2020Updated 5 years ago
- ☆18Aug 7, 2020Updated 5 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- ☆39Aug 5, 2025Updated 7 months ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- A kernel rootkit that works without kallsyms and kprobe support.☆29Aug 18, 2025Updated 6 months ago
- winafl with mopt mutators and afl fast power schedulers.☆22Feb 2, 2025Updated last year
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆34Jan 25, 2025Updated last year
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- Automatically attempts to solve simple CTF steganography challenges by running many existing tools and searching the output for a flag fo…☆24May 1, 2019Updated 6 years ago
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- ☆20Sep 15, 2023Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- My CTF Challenges☆22Oct 10, 2023Updated 2 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- ☆26May 10, 2021Updated 4 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- Fuzzing tutorial with easy-to-learn labs 🚀☆164Sep 4, 2022Updated 3 years ago
- MediaTek Fuzzing Workshop in HITCON 2021☆63Apr 28, 2022Updated 3 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- 在臺灣,我們希望藉由推廣「匿名網路」與「網路自由」的概念,喚起社會大眾對這些重要議題的重視。 我們計劃使用 Tor、Tails 和 OONI 等開源匿名工具,來增強在網路上的匿名性和安全性。並希望如新聞媒體、獨立記者、公民團體與開源科技社群能夠有更多機會協作與交流,共同探…☆41Feb 25, 2026Updated last week
- ☆55Jul 13, 2015Updated 10 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- 一個測試CVE-2024-4577和CVE-2024-8926的安全滲透工具☆40Mar 29, 2025Updated 11 months ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- Target-centric program analysis.☆76Feb 9, 2026Updated 3 weeks ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆211Jan 26, 2022Updated 4 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- ☆38Nov 30, 2020Updated 5 years ago