felixwilhelm / xenpwn
Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization
☆144Updated 8 years ago
Alternatives and similar repositories for xenpwn:
Users that are interested in xenpwn are comparing it to the libraries listed below
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆169Updated 10 years ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- ☆104Updated 9 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 2 years ago
- Synesthesia, implemented as Yices scripts☆92Updated 7 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated this week
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- ☆60Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- ☆28Updated 2 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆161Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆86Updated 8 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 6 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆117Updated 9 years ago
- Dynamic security analysis of embedded systems’ firmwares☆80Updated 8 years ago
- ☆85Updated 4 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Slides and very basic examples☆111Updated 7 years ago
- ☆160Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 8 years ago
- ☆38Updated 9 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 6 years ago