☆39Mar 31, 2021Updated 4 years ago
Alternatives and similar repositories for ufgraph
Users that are interested in ufgraph are comparing it to the libraries listed below
Sorting:
- IDA PDB Loader☆49Sep 21, 2018Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- Have fun with the LowFragmentationHeap☆254Feb 3, 2021Updated 5 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Nov 19, 2025Updated 4 months ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- C definitions processor.☆22Feb 3, 2018Updated 8 years ago
- ☆236May 31, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- ☆251Sep 26, 2020Updated 5 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Simple Simulator of ARMv6m instructions☆18May 23, 2017Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago