Binary exploitation by confusing the unwinder
☆68Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for chop
Users that are interested in chop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Sep 29, 2022Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Kernel Read Write Execute☆83Aug 30, 2024Updated last year
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel virtual address layout…☆476Updated this week
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90May 12, 2022Updated 3 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- ☆19Jun 15, 2024Updated last year
- AArch64 fuzzer based on the Apple Silicon hypervisor☆197Nov 23, 2023Updated 2 years ago
- ☆19Nov 7, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆252Jul 5, 2022Updated 3 years ago
- A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.☆11Aug 16, 2024Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- Generate a PDB file given the old PDB file and an address mapping☆53Aug 3, 2025Updated 8 months ago
- WTF Snapshot fuzzing of macOS targets☆99May 31, 2024Updated last year
- ☆12Apr 28, 2025Updated 11 months ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- ASLR bypass without infoleak☆167Nov 2, 2021Updated 4 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- ☆36Oct 25, 2021Updated 4 years ago
- ☆17Updated this week
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- ☆20Sep 15, 2023Updated 2 years ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- ☆14May 30, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Control-Flow Graph (CFG) Visualizer for VSCode☆68Apr 7, 2026Updated last week
- Symbolic Execution Over Processor Traces☆128Aug 14, 2024Updated last year
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆113Mar 28, 2024Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago