JonathanSalwan / stuffzLinks
Some low-level stuff
☆105Updated last year
Alternatives and similar repositories for stuffz
Users that are interested in stuffz are comparing it to the libraries listed below
Sorting:
- Uncovering Class Hierarchies in C++ Programs☆127Updated 2 years ago
- ☆61Updated 9 years ago
- A "general-purpose" tracing tool☆39Updated 10 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆132Updated 10 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆133Updated 9 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆140Updated 4 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- Code coverage analysis tools for the PIN Toolkit☆59Updated 12 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- ☆63Updated 9 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- ☆51Updated 7 years ago
- ☆49Updated 4 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- ☆87Updated 10 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆25Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago