Ikiga1 / writeupsLinks
Me trying to explain some CTF challenges I liked and exploited \0/
☆15Updated 4 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- This repository contains the currently implemented angr concrete targets.☆34Updated 2 years ago
- ☆49Updated 3 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆111Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆141Updated 4 years ago
- The fastest Intel-PT decoder for fuzzing☆377Updated 2 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆224Updated 7 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated last year
- ☆154Updated 9 months ago
- A fuzzing introspection tool☆167Updated 5 years ago
- Self-hosting binary instrumentation framework for security research☆220Updated 2 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆84Updated this week
- A hypervisor for fuzzing built with WHVP and Bochs☆380Updated 7 years ago
- Target-centric program analysis.☆76Updated 2 weeks ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆214Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Updated 5 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Updated 8 years ago
- ☆12Updated 5 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- Some much-needed sanity for byte-wrangling in python3.☆43Updated 3 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago
- A collection of extensions to angr to handle new platforms☆69Updated 2 months ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- ☆200Updated 2 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 4 years ago
- ☆116Updated last year