my automatic exploit generation (DEPRECATED)
☆59Jun 21, 2016Updated 9 years ago
Alternatives and similar repositories for aegg
Users that are interested in aegg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 8 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- Something about AEG☆270May 29, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 9 months ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,146Sep 10, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆652Jan 12, 2026Updated 2 months ago
- Automatic Exploit Generation Paper☆87Dec 12, 2021Updated 4 years ago
- 試試你的好手氣☆39Jan 26, 2026Updated 2 months ago
- I am still working on it☆11Apr 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- AIS3 CRAX lab demo☆34Apr 26, 2017Updated 8 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- ☆52Nov 22, 2021Updated 4 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆44Nov 22, 2016Updated 9 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 8 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- Documentation for the angr suite☆847Apr 27, 2023Updated 2 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- ☆12Jul 25, 2019Updated 6 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- Android 版台灣社交距離原始碼☆17Jul 8, 2021Updated 4 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago