ZehMatt / DrCodeCovLinks
Code Coverage client for DynamoRIO
☆12Updated 6 years ago
Alternatives and similar repositories for DrCodeCov
Users that are interested in DrCodeCov are comparing it to the libraries listed below
Sorting:
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Updated 4 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- IDA (sort of) headless☆26Updated last year
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- ☆16Updated 5 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated 2 years ago
- prebuild angr wheels for Windows on x86_64☆15Updated 7 years ago
- ☆35Updated 3 years ago
- ☆14Updated 2 years ago
- expansion of afl-unicorn using c++☆28Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- ☆41Updated 4 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- ☆19Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆20Updated 4 years ago
- 2018 Advent Calendar browser pwnables☆15Updated 6 years ago
- PoC for CVE-2017-0075☆37Updated 6 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- ☆41Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Updated 2 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Updated 5 years ago
- ☆14Updated 5 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 7 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Updated 3 years ago