SkyLined / BugIdLinks
Detect, analyze and uniquely identify crashes in Windows applications
☆514Updated 5 months ago
Alternatives and similar repositories for BugId
Users that are interested in BugId are comparing it to the libraries listed below
Sorting:
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆336Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).☆272Updated 3 months ago
- Linux Heap Exploitation Practice☆392Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆651Updated 4 months ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆357Updated last year
- jemalloc heap exploitation framework☆459Updated 3 years ago
- A distributed fuzzing testing suite with web administration☆373Updated 6 years ago
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆494Updated 4 years ago
- INFILTRATE 2019 Demo Materials☆342Updated 2 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆330Updated 3 years ago
- ☆619Updated 2 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆341Updated 6 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆761Updated 3 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- Simplify format string exploitation.☆344Updated 4 years ago
- Visualization of heap operations.☆614Updated 11 months ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆407Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆388Updated 2 years ago
- Pure Python parser and analyzer for IDA Pro database files (.idb).☆484Updated 6 months ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆188Updated 4 years ago
- My Chrome and Safari exploit code + write-up repo☆531Updated 4 years ago
- ☆250Updated 5 years ago
- Using Intel's PIN tool to solve CTF problems☆504Updated 5 years ago
- The 'exploitable' GDB plugin☆743Updated 3 years ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- Scripts for Binary Ninja☆258Updated 2 years ago