HeapHopper is a bounded model checking framework for Heap-implementations
☆227Jul 2, 2025Updated 8 months ago
Alternatives and similar repositories for heaphopper
Users that are interested in heaphopper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆655Jan 12, 2026Updated 2 months ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- ☆252Mar 13, 2020Updated 6 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Feb 24, 2019Updated 7 years ago
- The new phuzzing framework!☆164Jun 14, 2024Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆204Jul 22, 2020Updated 5 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆158Mar 3, 2021Updated 5 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆504Sep 7, 2018Updated 7 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆94Jan 19, 2022Updated 4 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆769Jul 25, 2022Updated 3 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- ☆815Mar 6, 2026Updated 2 weeks ago
- A DBI tool to discover heap memory related bugs☆125Jun 25, 2018Updated 7 years ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆955Jul 18, 2022Updated 3 years ago
- my automatic exploit generation (DEPRECATED)☆59Jun 21, 2016Updated 9 years ago
- Visualization of heap operations.☆616Dec 5, 2024Updated last year
- Driller: augmenting AFL with symbolic execution!☆965Mar 24, 2025Updated 11 months ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆521Jan 18, 2022Updated 4 years ago
- AFL/QEMU fuzzing with full-system emulation.☆641Sep 9, 2018Updated 7 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆97Aug 22, 2018Updated 7 years ago
- The fastest Intel-PT decoder for fuzzing☆378Feb 2, 2024Updated 2 years ago
- 🔍Heap analysis tool for CTF pwn.☆224May 4, 2021Updated 4 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago