Memoro: A Detailed Heap Profiler
☆185Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for memoro
Users that are interested in memoro are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 10 years ago
- CppCon 2019 Talk: slides and source code☆48Sep 27, 2019Updated 6 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 8 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 6 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated last month
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- Restartable Sequences: a userspace implementation of cheap per-cpu atomic operations☆38Dec 31, 2018Updated 7 years ago
- llvm crash analysis☆44Jun 26, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- Differential fuzzing for the masses!☆155Aug 9, 2017Updated 8 years ago
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- Fork of LLVM with modifications to support a program repository☆25Mar 28, 2022Updated 4 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 9 months ago
- ☆38Feb 6, 2021Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Generic Automatic Parallel Profiler☆35Oct 4, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Multi-platform topology-aware memory management library☆13Apr 23, 2020Updated 5 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Sep 16, 2022Updated 3 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆125Mar 31, 2021Updated 5 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- code for examining determinism of performance counters☆21Mar 18, 2021Updated 5 years ago
- DRAM error-correction code (ECC) simulator incorporating statistical error properties and DRAM design characteristics for inferring pre-c…☆10Dec 7, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- "CF3" is a C compiler test suite targeting arithmetic optimization.☆38Jul 6, 2017Updated 8 years ago
- NoVT is a compiler-based defense against vtable hijacking in C++ programs. It compiles C++ programs without using vtables.☆50Sep 29, 2022Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- TOML deck generator with custom templates and schema validation☆37Oct 7, 2023Updated 2 years ago
- Recursive process fork/exec tracing for Linux systems using ptrace()☆21Oct 6, 2025Updated 5 months ago