auto-ropper
☆17Jul 7, 2022Updated 3 years ago
Alternatives and similar repositories for auto-ropper
Users that are interested in auto-ropper are comparing it to the libraries listed below
Sorting:
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Fuzzing Multiparty Protocols like Pub/Sub Protocols☆19Sep 3, 2021Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Nov 7, 2021Updated 4 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- ☆27Nov 30, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆34Jan 25, 2025Updated last year
- ☆28Apr 18, 2024Updated last year
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- Automatically attempts to solve simple CTF steganography challenges by running many existing tools and searching the output for a flag fo…☆24May 1, 2019Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆10Nov 28, 2023Updated 2 years ago
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- Collection of pwn techniques☆29Feb 12, 2022Updated 4 years ago
- binary ninja related code☆37Mar 27, 2025Updated 11 months ago
- Target-centric program analysis.☆76Feb 9, 2026Updated 3 weeks ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- A tool for finding the one gadget RCE in libc☆76May 30, 2020Updated 5 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 12 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆96Jun 29, 2022Updated 3 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- Automatic Vulnerability Discovery☆38Mar 30, 2019Updated 6 years ago
- headless-ida-mcp-server☆30Apr 4, 2025Updated 11 months ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆24Feb 12, 2026Updated 3 weeks ago
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Jun 19, 2020Updated 5 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 3 years ago
- CLI tool for submitting GPU kernels☆13May 26, 2025Updated 9 months ago
- CLI spectral histograms of mic audio | Pitch / chord detection algorithms☆12Dec 8, 2024Updated last year