my automatic exploit generation (DEPRECATED)
☆59Jun 21, 2016Updated 9 years ago
Alternatives and similar repositories for aegg
Users that are interested in aegg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 8 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- Something about AEG☆270May 29, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 9 months ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Sep 4, 2019Updated 6 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,144Sep 10, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆652Jan 12, 2026Updated 3 months ago
- Automatic Exploit Generation Paper☆87Dec 12, 2021Updated 4 years ago
- 試試你的好手氣☆39Jan 26, 2026Updated 3 months ago
- I am still working on it☆11Apr 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AIS3 CRAX lab demo☆34Apr 26, 2017Updated 9 years ago
- Automatic exploit generation for simple linux pwn challenges.☆320May 14, 2023Updated 2 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- ☆52Nov 22, 2021Updated 4 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆44Nov 22, 2016Updated 9 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆13Feb 1, 2017Updated 9 years ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 8 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- Documentation for the angr suite☆847Apr 27, 2023Updated 3 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- ☆12Jul 25, 2019Updated 6 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- Android 版台灣社交距離原始碼☆17Jul 8, 2021Updated 4 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 7 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago