JonathanSalwan / stuffzLinks
Some low-level stuff
☆107Updated last year
Alternatives and similar repositories for stuffz
Users that are interested in stuffz are comparing it to the libraries listed below
Sorting:
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 2 years ago
- ☆61Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆135Updated 9 years ago
- ☆88Updated 10 years ago
- QTrace, a "zero knowledge" system call tracer☆53Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- ☆63Updated 9 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆132Updated 10 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 11 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 9 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- Code coverage analysis tools for the PIN Toolkit☆60Updated 12 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 5 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- A "general-purpose" tracing tool☆39Updated 10 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆77Updated 5 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago