Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.
☆19Mar 4, 2016Updated 10 years ago
Alternatives and similar repositories for elf_add_code
Users that are interested in elf_add_code are comparing it to the libraries listed below
Sorting:
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Automated Return-Oriented Programming Chaining☆85Aug 30, 2016Updated 9 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- ☆27May 29, 2015Updated 10 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- ☆13Jun 19, 2017Updated 8 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- Python repository containing parsed standard C library function and argument information☆29Oct 3, 2018Updated 7 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Formal verification of SecVisor, a secure hypervisor☆13Apr 23, 2013Updated 12 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago
- [WIP] pivot a running process into an emulator for instrumentation☆13Aug 12, 2016Updated 9 years ago
- Semantic Binary Code Analysis Framework☆125Sep 28, 2015Updated 10 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Adds symbols to a ELF file.☆65Jul 25, 2015Updated 10 years ago