Traxes / zenoLinks
Automatic Vulnerability Discovery
☆38Updated 6 years ago
Alternatives and similar repositories for zeno
Users that are interested in zeno are comparing it to the libraries listed below
Sorting:
- Patches to afl to fix bugs or add enhancements☆82Updated 6 years ago
- Library to wrap all file calls when fuzzing with AFL++☆51Updated 2 years ago
- Recent Fuzzing Paper☆36Updated 2 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- An index of archived code and papers. Open an issue to request an addition.☆23Updated 5 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆28Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- ☆50Updated 5 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 3 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated last month
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 6 years ago
- ☆92Updated 4 years ago
- ☆88Updated 6 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Updated 7 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆134Updated 2 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆58Updated 6 years ago
- ☆125Updated 4 years ago