CRAX: software CRash analysis for Automatic eXploit generation
☆51Aug 19, 2015Updated 10 years ago
Alternatives and similar repositories for CRAX
Users that are interested in CRAX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A x86 systematic ROP payload generation☆57Feb 28, 2020Updated 6 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆104Jan 13, 2023Updated 3 years ago
- AIS3 CRAX lab demo☆34Apr 26, 2017Updated 9 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Jun 10, 2015Updated 10 years ago
- A(nother) Binary Analysis Framework☆31Jun 10, 2014Updated 11 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 8 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Use k-means improve seed selection.☆12Apr 7, 2021Updated 5 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- LN-fuzz: State Sequence Network Protocol Fuzzer☆11Jun 16, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆653Jan 12, 2026Updated 4 months ago
- MS-Fuzz data☆15Nov 5, 2022Updated 3 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆157Mar 3, 2021Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆155Oct 4, 2021Updated 4 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆216Aug 15, 2025Updated 9 months ago
- ☆37Jun 1, 2022Updated 3 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆103Jul 14, 2022Updated 3 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆314Jun 25, 2020Updated 5 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- HITCON electric badge for HITCON CMT 2019.☆77Mar 19, 2020Updated 6 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Android 版台灣社交距離原始碼☆17Jul 8, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆96Feb 27, 2018Updated 8 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Keyword Cloud for your current location.☆13Jan 20, 2021Updated 5 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- CTF Writeups☆23May 9, 2018Updated 8 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago