Binary exploitation by confusing the unwinder
☆68Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for chop
Users that are interested in chop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Sep 29, 2022Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Kernel Read Write Execute☆84Aug 30, 2024Updated last year
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆470Apr 13, 2024Updated last year
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆92May 12, 2022Updated 3 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- ☆19Jun 15, 2024Updated last year
- AArch64 fuzzer based on the Apple Silicon hypervisor☆197Nov 23, 2023Updated 2 years ago
- ☆18Nov 7, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.☆11Aug 16, 2024Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- Generate a PDB file given the old PDB file and an address mapping☆53Aug 3, 2025Updated 7 months ago
- WTF Snapshot fuzzing of macOS targets☆98May 31, 2024Updated last year
- ☆12Apr 28, 2025Updated 11 months ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- ☆17Nov 27, 2020Updated 5 years ago
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- ☆20Sep 15, 2023Updated 2 years ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- ☆14May 30, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- Control-Flow Graph (CFG) Visualizer for VSCode☆67Feb 21, 2026Updated last month
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- PWN初学者好题精炼☆30Aug 24, 2017Updated 8 years ago