ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers
☆15Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for PrimGen
Users that are interested in PrimGen are comparing it to the libraries listed below
Sorting:
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆29Mar 8, 2022Updated 4 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆38Dec 4, 2025Updated 3 months ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Fuzzing with the generated argument☆33Jan 6, 2023Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Mar 11, 2026Updated last week
- Automatic Exploit Generation Paper☆88Dec 12, 2021Updated 4 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆40Nov 20, 2018Updated 7 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- DBGBench Website:☆19Feb 24, 2021Updated 5 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57May 4, 2019Updated 6 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- libipt - an Intel(R) Processor Trace decoder library☆18Apr 7, 2017Updated 8 years ago
- Fast and Precise On-the-fly Patch Validation for All☆10Feb 24, 2023Updated 3 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year