areiter / InMemoryFuzzingLinks
In memory fuzzing for embedded devices
☆19Updated 13 years ago
Alternatives and similar repositories for InMemoryFuzzing
Users that are interested in InMemoryFuzzing are comparing it to the libraries listed below
Sorting:
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- S2E plugins library☆17Updated 5 years ago
- ☆14Updated 10 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Updated 9 years ago
- Immunity Debugger Taint Tracer☆20Updated 12 years ago
- CVE-2015-2231 POC☆10Updated 10 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- ☆32Updated 7 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- ☆25Updated 7 years ago
- Some tools☆10Updated 7 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Updated 8 years ago
- ☆28Updated last year
- taint tracer/analysis pintool☆25Updated 11 years ago
- Toy project for static analysis of ELF binaries☆29Updated 8 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 6 years ago
- ☆17Updated 11 years ago
- Linux hooking engine for ARM architecture☆16Updated 10 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- Fuzzer☆43Updated 11 years ago
- libs2e.so☆19Updated 4 years ago
- A GCC plugin implementing various stack canaries.☆14Updated 13 years ago
- reproduce the experiment in the report.☆28Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Updated 10 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆28Updated 12 years ago