Some low-level stuff
☆109May 19, 2024Updated last year
Alternatives and similar repositories for stuffz
Users that are interested in stuffz are comparing it to the libraries listed below
Sorting:
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆119Aug 20, 2015Updated 10 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- Pintool example and PoC for dynamic binary analysis☆598Feb 15, 2022Updated 4 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆278Nov 2, 2018Updated 7 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆215Aug 15, 2025Updated 6 months ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.☆19Jan 27, 2011Updated 15 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 10 years ago
- ☆87Jun 5, 2015Updated 10 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆43Jul 17, 2020Updated 5 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Trace events in real time sessions☆47Aug 25, 2023Updated 2 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Implementations of program analysis tools with a focus on machine code☆208Sep 21, 2014Updated 11 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 4 years ago