epfl-vlsc / memoroView external linksLinks
Memoro: A Detailed Heap Profiler
☆185Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for memoro
Users that are interested in memoro are comparing it to the libraries listed below
Sorting:
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 9 years ago
- CppCon 2019 Talk: slides and source code☆48Sep 27, 2019Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29May 22, 2023Updated 2 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- CLang Plugin for calculating AST hashes☆15Feb 11, 2019Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- code for examining determinism of performance counters☆21Mar 18, 2021Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- ☆39Feb 6, 2021Updated 5 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Fork of LLVM with modifications to support a program repository☆25Mar 28, 2022Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- llvm crash analysis☆44Jun 26, 2024Updated last year
- Recursive process fork/exec tracing for Linux systems using ptrace()☆21Oct 6, 2025Updated 4 months ago
- Uncovering Class Hierarchies in C++ Programs☆127Sep 16, 2022Updated 3 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆224Jul 2, 2025Updated 7 months ago
- ☆91Jul 31, 2019Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- ☆132Oct 10, 2019Updated 6 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- Generic Automatic Parallel Profiler☆35Oct 4, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Restartable Sequences: a userspace implementation of cheap per-cpu atomic operations☆38Dec 31, 2018Updated 7 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 3 months ago
- "CF3" is a C compiler test suite targeting arithmetic optimization.☆37Jul 6, 2017Updated 8 years ago
- Explore LLVM Bitcode interactively using a graph database☆58Feb 28, 2020Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago