ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers
☆15Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for PrimGen
Users that are interested in PrimGen are comparing it to the libraries listed below
Sorting:
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated 3 weeks ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆29Mar 8, 2022Updated 3 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- ☆13Oct 1, 2020Updated 5 years ago
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- ☆34Nov 11, 2021Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- ☆12May 31, 2018Updated 7 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- ☆31Oct 25, 2021Updated 4 years ago
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- Automatic Exploit Generation Paper☆89Dec 12, 2021Updated 4 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Mar 25, 2021Updated 4 years ago
- Target components for kAFL/Nyx Fuzzer☆34Jul 21, 2025Updated 7 months ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- ☆16Apr 15, 2019Updated 6 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago