angr / acsac-course
☆49Updated 4 years ago
Alternatives and similar repositories for acsac-course:
Users that are interested in acsac-course are comparing it to the libraries listed below
- A pip wrapper around AFL.☆85Updated 4 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- Utilities for generating dynamic traces☆91Updated 2 weeks ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Mozilla fork of the American Fuzzy Lop repo☆46Updated 6 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆81Updated 8 years ago
- Patches to afl to fix bugs or add enhancements☆80Updated 5 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆89Updated 5 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- run AFL with pintool☆65Updated 5 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆63Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 7 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 2 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆54Updated 2 months ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- ☆63Updated 5 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- ☆87Updated 9 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆51Updated 6 years ago