my automatic exploit generation (DEPRECATED)
☆60Jun 21, 2016Updated 9 years ago
Alternatives and similar repositories for aegg
Users that are interested in aegg are comparing it to the libraries listed below
Sorting:
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆226Jul 2, 2025Updated 8 months ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,146Sep 10, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆656Jan 12, 2026Updated 2 months ago
- Automatic Exploit Generation Paper☆88Dec 12, 2021Updated 4 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- AIS3 CRAX lab demo☆34Apr 26, 2017Updated 8 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- ☆52Nov 22, 2021Updated 4 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆44Nov 22, 2016Updated 9 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 8 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- Documentation for the angr suite☆848Apr 27, 2023Updated 2 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- ☆12Jul 25, 2019Updated 6 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- Android 版台灣社交距離原始碼☆17Jul 8, 2021Updated 4 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago