Automatic vulnerability detection and exploit generation
☆16Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for AEG
Users that are interested in AEG are comparing it to the libraries listed below
Sorting:
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆34Oct 16, 2019Updated 6 years ago
- my automatic exploit generation (DEPRECATED)☆60Jun 21, 2016Updated 9 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆48Nov 11, 2022Updated 3 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57May 4, 2019Updated 6 years ago
- ☆19Mar 29, 2025Updated 11 months ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- Automatic Exploit Generation Paper☆89Dec 12, 2021Updated 4 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Jul 11, 2020Updated 5 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- libipt - an Intel(R) Processor Trace decoder library☆18Apr 7, 2017Updated 8 years ago
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- A repository with binaries for angr tests and examples.☆63Feb 24, 2026Updated last week
- EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language fr…☆29Mar 8, 2022Updated 3 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- ☆52Dec 28, 2023Updated 2 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- The vm images in this repo are lost, we recommend our new project: https://github.com/hust-open-atom-club/S2VulnHub☆337Jul 10, 2024Updated last year
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆24May 10, 2023Updated 2 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- AIS3 CRAX lab demo☆34Apr 26, 2017Updated 8 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated 2 months ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- 💖CTF pwn framework.☆341May 3, 2022Updated 3 years ago
- https://github.com/wcventure/FuzzingPaper☆10Jan 15, 2022Updated 4 years ago