chop-project / chopLinks
Binary exploitation by confusing the unwinder
☆63Updated 2 years ago
Alternatives and similar repositories for chop
Users that are interested in chop are comparing it to the libraries listed below
Sorting:
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆76Updated 7 months ago
- ☆131Updated 4 months ago
- ☆82Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆67Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆63Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆81Updated 3 months ago
- Target components for kAFL/Nyx Fuzzer☆35Updated last year
- ☆100Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 7 months ago
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- Kernel Read Write Execute☆86Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 10 months ago
- ☆38Updated last year
- ☆60Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- ☆32Updated 2 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆164Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 3 months ago
- Target components for kAFL/Nyx Fuzzer☆32Updated last month
- Python bindings for BochsCPU☆37Updated last month
- ☆74Updated 9 months ago
- Same-Architecture Firmware Rehosting and Fuzzing☆126Updated 8 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆68Updated 3 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 10 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated 10 months ago