cbOverhead / EasyROPLinks
A Python tool to generate ROP chains
☆63Updated 4 months ago
Alternatives and similar repositories for EasyROP
Users that are interested in EasyROP are comparing it to the libraries listed below
Sorting:
- ☆35Updated 9 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆39Updated 4 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Collection of pin tools☆51Updated 9 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- exploit development☆49Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- ☆91Updated 5 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago
- Personal repository for all ctf related stuffs☆67Updated 7 months ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆26Updated 13 years ago
- ☆87Updated 10 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- ☆33Updated 8 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆91Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆123Updated 6 years ago
- ☆52Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- Flare-On solutions☆36Updated 5 years ago