acama / xropLinks
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
☆306Updated last year
Alternatives and similar repositories for xrop
Users that are interested in xrop are comparing it to the libraries listed below
Sorting:
- Function redirection via ELF tricks.☆164Updated 10 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆214Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- PEDA-like debugger UI for WinDbg☆206Updated last year
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 6 years ago
- CTF Challenge Framework for Windows 8 and above☆156Updated 4 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago
- Export dwarf debug information from IDA Pro☆215Updated 3 years ago
- Cross Platform Kernel Fuzzer Framework☆455Updated 7 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- GlibC Malloc for Exploiters presentation☆152Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- Fentanyl is an IDAPython script that makes patching significantly easier☆211Updated 3 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated 3 months ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆149Updated 9 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆224Updated 7 months ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Updated 6 years ago
- Cross Architecture Shellcode in C☆208Updated 9 years ago
- Symbolic Execution Tool in r2☆106Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Updated 5 years ago
- Scripts for Binary Ninja☆258Updated 2 years ago
- Some helper scripts to set up an environment for angr development.☆123Updated this week
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆214Updated 4 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆189Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Updated 3 years ago
- SymGDB - symbolic execution plugin for gdb☆218Updated 7 years ago
- ☆167Updated 8 years ago