bannsec / autoPwn
Automate repetitive tasks for fuzzing
☆125Updated 3 years ago
Alternatives and similar repositories for autoPwn:
Users that are interested in autoPwn are comparing it to the libraries listed below
- riufuzz —— honggfuzz modifited version by riusksk, better support for windows (cdb symbols) and macOS, and more colorful UI☆132Updated 5 years ago
- ☆67Updated 4 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆131Updated 5 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆80Updated 6 years ago
- a IDA 7.0 plugins that helps to attach process created by pwntools and debug pwn☆70Updated last year
- Write-ups from A*0*E.☆197Updated 4 years ago
- A collection of vulnerabilities discovered by the AFL fuzzer (afl-fuzz)☆92Updated 7 years ago
- The new phuzzing framework!☆155Updated 8 months ago
- The Harvest of V8 regress.☆136Updated 4 years ago
- WCTF2019 challenge: Gyotaku The Flag☆41Updated 5 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- VirtualBox 3D exploits & PoCs☆160Updated 6 years ago
- September Chrome 1day by István Kurucsai☆81Updated 5 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆88Updated 6 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- Source code and exploits for some 35c3ctf challenges.☆137Updated 6 years ago
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆65Updated 8 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆87Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆246Updated 5 years ago
- The FTP fuzzer for Sulley and Peach.☆54Updated 11 years ago
- realworld ctf live stream☆74Updated last year
- ☆97Updated 3 years ago
- 🍗An interactive way of pwnning.☆43Updated 5 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆89Updated 6 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆87Updated 6 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 3 years ago