SkyLined / BugIdLinks
Detect, analyze and uniquely identify crashes in Windows applications
☆514Updated 5 months ago
Alternatives and similar repositories for BugId
Users that are interested in BugId are comparing it to the libraries listed below
Sorting:
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆336Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆651Updated 3 months ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- A distributed fuzzing testing suite with web administration☆373Updated 6 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆329Updated 2 years ago
- Linux Heap Exploitation Practice☆391Updated 6 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆356Updated last year
- INFILTRATE 2019 Demo Materials☆339Updated 2 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆386Updated 2 years ago
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆493Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆308Updated 6 years ago
- This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).☆271Updated 2 months ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆340Updated 6 years ago
- ☆249Updated 5 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- jemalloc heap exploitation framework☆459Updated 3 years ago
- ☆616Updated 2 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆761Updated 3 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆407Updated 3 years ago
- My Chrome and Safari exploit code + write-up repo☆529Updated 3 years ago
- Using Intel's PIN tool to solve CTF problems☆500Updated 5 years ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- Visualization of heap operations.☆614Updated 10 months ago
- The 'exploitable' GDB plugin☆743Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- Pure Python parser and analyzer for IDA Pro database files (.idb).☆484Updated 5 months ago
- CTF Challenge Framework for Windows 8 and above☆155Updated 4 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 5 years ago