CRAX: software CRash analysis for Automatic eXploit generation
☆50Aug 19, 2015Updated 10 years ago
Alternatives and similar repositories for CRAX
Users that are interested in CRAX are comparing it to the libraries listed below
Sorting:
- A x86 systematic ROP payload generation☆57Feb 28, 2020Updated 6 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- AIS3 CRAX lab demo☆34Apr 26, 2017Updated 8 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Use k-means improve seed selection.☆13Apr 7, 2021Updated 4 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- LN-fuzz: State Sequence Network Protocol Fuzzer☆11Jun 16, 2021Updated 4 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆656Jan 12, 2026Updated 2 months ago
- MS-Fuzz data☆15Nov 5, 2022Updated 3 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Mar 3, 2021Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆156Oct 4, 2021Updated 4 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆215Aug 15, 2025Updated 7 months ago
- ☆37Jun 1, 2022Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Jul 14, 2022Updated 3 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- HITCON electric badge for HITCON CMT 2019.☆77Mar 19, 2020Updated 6 years ago
- List the real world programs evaluated in fuzzing papers.☆56Jan 14, 2019Updated 7 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Android 版台灣社交距離原始碼☆17Jul 8, 2021Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- ☆22Nov 27, 2013Updated 12 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- CTF Writeups☆23May 9, 2018Updated 7 years ago