my automatic exploit generation (DEPRECATED)
☆60Jun 21, 2016Updated 9 years ago
Alternatives and similar repositories for aegg
Users that are interested in aegg are comparing it to the libraries listed below
Sorting:
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- AIS3 CRAX lab demo☆34Apr 26, 2017Updated 8 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆224Jul 2, 2025Updated 7 months ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,147Sep 10, 2023Updated 2 years ago
- Automatic Exploit Generation Paper☆89Dec 12, 2021Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆654Jan 12, 2026Updated last month
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 7 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Fuzzing with the generated argument☆33Jan 6, 2023Updated 3 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- 💖CTF pwn framework.☆341May 3, 2022Updated 3 years ago
- Build a database of libc offsets to simplify exploitation☆20Apr 23, 2016Updated 9 years ago
- Android 版台灣社交距離原始碼☆17Jul 8, 2021Updated 4 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆44Nov 22, 2016Updated 9 years ago
- Cython bindings for libpcap and libtins☆10Dec 19, 2016Updated 9 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Google dorks generator to find open shells (on government sites)☆28Jul 9, 2014Updated 11 years ago
- CRAX: software CRash analysis for Automatic eXploit generation☆50Aug 19, 2015Updated 10 years ago