acama / xrop
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
☆300Updated 6 months ago
Alternatives and similar repositories for xrop:
Users that are interested in xrop are comparing it to the libraries listed below
- This tool can be useful for solving some reversing challenges in CTFs events.☆140Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆448Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆225Updated 4 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆203Updated 2 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆334Updated 5 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆385Updated 2 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆296Updated 2 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆146Updated 8 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆384Updated last year
- PEDA-like debugger UI for WinDbg☆202Updated 10 months ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆255Updated last month
- Function redirection via ELF tricks.☆157Updated 9 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆186Updated 3 years ago
- IDA script for highlighting and decoding ARM system instructions☆393Updated 3 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆246Updated 5 years ago
- Linux Heap Exploitation Practice☆377Updated 6 years ago
- CTF Challenge Framework for Windows 8 and above☆151Updated 3 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Repository to train/learn memory corruption on the ARM platform.☆352Updated 7 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆181Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- Scripts for Binary Ninja☆254Updated last year
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- Export dwarf debug information from IDA Pro☆208Updated 2 years ago
- ☆236Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago