SQLab / ropchainLinks
A x86 systematic ROP payload generation
☆57Updated 5 years ago
Alternatives and similar repositories for ropchain
Users that are interested in ropchain are comparing it to the libraries listed below
Sorting:
- Modified from pwndbg. Enhance the UI part for better usage.☆26Updated 6 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Updated 9 years ago
- My CTF writeup☆26Updated 8 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- CRAX: software CRash analysis for Automatic eXploit generation☆50Updated 10 years ago
- SymGDB - symbolic execution plugin for gdb☆218Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- ☆81Updated 8 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- ☆28Updated 3 years ago
- Python concolic execution framework for program analysis☆68Updated 11 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 12 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 10 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- ☆64Updated 10 years ago
- ☆40Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Distributed Fuzzing for afl☆72Updated 10 years ago
- Linux local root exploit for CVE-2014-0038☆199Updated 11 years ago
- ☆85Updated 5 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago
- ☆45Updated 7 years ago