☆39Mar 31, 2021Updated 4 years ago
Alternatives and similar repositories for ufgraph
Users that are interested in ufgraph are comparing it to the libraries listed below
Sorting:
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- IDA PDB Loader☆49Sep 21, 2018Updated 7 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Have fun with the LowFragmentationHeap☆253Feb 3, 2021Updated 5 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Nov 19, 2025Updated 3 months ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- ☆236May 31, 2018Updated 7 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- ☆251Sep 26, 2020Updated 5 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- YaCo is an Hex-Rays IDA plugin. When enabled, multiple users can work simultaneously on the same binary. Any modification done by any use…☆325Aug 5, 2019Updated 6 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆521May 23, 2025Updated 9 months ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago