alset0326 / peda-armLinks
GDB plugin peda for arm
☆146Updated last month
Alternatives and similar repositories for peda-arm
Users that are interested in peda-arm are comparing it to the libraries listed below
Sorting:
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- Frida-based general purpose fuzzer☆218Updated 4 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆67Updated 6 years ago
- ☆58Updated 4 years ago
- ☆60Updated 6 months ago
- ☆88Updated 9 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆209Updated 2 years ago
- Some new commands debug heap for peda☆99Updated 3 months ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Updated 11 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆89Updated 6 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- JavaScript Engine Exploits in CTF☆3Updated 6 years ago
- android kernel pwn☆20Updated 6 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆81Updated 6 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- Packages for IDA Pro (written in python but supports all)☆132Updated 4 years ago
- Source code and exploits for some 35c3ctf challenges.☆141Updated 6 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆342Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- The Harvest of V8 regress.☆137Updated 4 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆152Updated 5 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆300Updated 2 years ago
- GDB for pwn☆11Updated last year
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆122Updated 8 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- A gdb like debugger that provide a runtime env to unicorn emulator and additionals features!☆193Updated 2 years ago
- a IDA 7.0 plugins that helps to attach process created by pwntools and debug pwn☆72Updated 2 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago