Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.
☆19Mar 4, 2016Updated 9 years ago
Alternatives and similar repositories for elf_add_code
Users that are interested in elf_add_code are comparing it to the libraries listed below
Sorting:
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- An open source, multi-architecture ROP compiler written in python☆162Jun 14, 2017Updated 8 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Aug 30, 2016Updated 9 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- Program memory visualizer for GDB/LLDB (bachelor thesis)☆12Apr 17, 2016Updated 9 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Python static analyzer☆11Dec 26, 2016Updated 9 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- ☆13Jun 19, 2017Updated 8 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- CGEN with support for generating IDA Pro IDP modules☆30Dec 28, 2015Updated 10 years ago
- ☆27May 29, 2015Updated 10 years ago
- An ARM Assembler and Simulator/Debugger☆15Jan 26, 2010Updated 16 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- A toolset for extending closed-source Linux processes☆10Apr 12, 2016Updated 9 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- A simple C library for entropy measurement of byte streams and other data.☆14Dec 9, 2019Updated 6 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Finds knight's tours on square boards of arbitrary size that follow Warnsdorff's rule☆14Jun 5, 2011Updated 14 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago