Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
☆59Dec 7, 2021Updated 4 years ago
Alternatives and similar repositories for gadget_synthesis
Users that are interested in gadget_synthesis are comparing it to the libraries listed below
Sorting:
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- ☆36Aug 25, 2021Updated 4 years ago
- Dr. Disassembler☆38Jan 5, 2022Updated 4 years ago
- kAFL Fuzzer☆34Mar 12, 2025Updated 11 months ago
- ☆21Feb 15, 2022Updated 4 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- Measure Basic Blocks coverage of all testcases in the AFL queue using a patched QEMU☆23Jan 15, 2024Updated 2 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Extract HP printer ".bdl" firmware update files☆12Nov 15, 2017Updated 8 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- ROP database plugin for IDA☆32Jun 5, 2018Updated 7 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- Public BanditFuzz Repo☆12Jan 12, 2021Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆215Sep 17, 2021Updated 4 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Tango: Extracting Higher-Order Feedback through State Inference☆17Aug 8, 2024Updated last year
- ☆42Oct 10, 2025Updated 4 months ago
- Hardening code obfuscation against automated attacks☆154Jan 23, 2024Updated 2 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆33Feb 15, 2022Updated 4 years ago
- A toy code generator (i.e. "program synthesis") using the Z3 solver☆35Nov 13, 2017Updated 8 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- ☆15Mar 13, 2023Updated 2 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- ☆99Dec 1, 2023Updated 2 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆323Dec 16, 2021Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago