agustingianni / Utilities
Uncategorized utilities
☆56Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Utilities
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 6 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆131Updated 10 years ago
- ☆25Updated 6 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆30Updated 7 years ago
- cve-2014-4323 poc☆23Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 6 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- A "general-purpose" tracing tool☆37Updated 9 years ago
- XED based Disassembly Engine☆18Updated 6 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆28Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆50Updated 8 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 7 years ago
- Fuzzer☆43Updated 10 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated 3 months ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- ☆28Updated 2 years ago
- Use CVE-2016-3308 corrupt win32k desktop heap☆50Updated 8 years ago
- ☆31Updated 7 years ago