☆49Feb 16, 2018Updated 8 years ago
Alternatives and similar repositories for aslur
Users that are interested in aslur are comparing it to the libraries listed below
Sorting:
- ☆17Oct 5, 2020Updated 5 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆226Jul 2, 2025Updated 8 months ago
- A program to draw rectangles from heap traces.☆135Feb 27, 2020Updated 6 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- ☆30May 23, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Linux Kernel Source Tree Reducer☆81Oct 29, 2024Updated last year
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Slides and very basic examples☆112May 17, 2017Updated 8 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Aug 11, 2024Updated last year
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- Python bindings for the Hexrays Decompiler☆88Dec 25, 2021Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆303Jan 12, 2023Updated 3 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- ☆44Oct 22, 2025Updated 4 months ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago