IOActive / Melkor_ELF_FuzzerLinks
Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.
☆153Updated last year
Alternatives and similar repositories for Melkor_ELF_Fuzzer
Users that are interested in Melkor_ELF_Fuzzer are comparing it to the libraries listed below
Sorting:
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆70Updated 8 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆52Updated last year
- ☆49Updated 7 years ago
- r2con 2017 September 6-9☆97Updated 8 years ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- ☆166Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆142Updated 4 years ago
- Programmatic disassembly and patching☆69Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Python repository containing parsed standard C library function and argument information☆28Updated 7 years ago
- ARM Shellcode Generator☆103Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- radare2 + miasm2 = ♥☆102Updated 5 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- Tools, documentation and scripts to move projects from IDA to R2 and viceversa☆135Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago
- GCC Obfuscation Augmentation Tools☆82Updated 2 years ago
- Linux local root exploit for CVE-2014-0038☆199Updated 11 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago