felixwilhelm / xenpwnLinks
Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization
☆144Updated 8 years ago
Alternatives and similar repositories for xenpwn
Users that are interested in xenpwn are comparing it to the libraries listed below
Sorting:
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- ☆105Updated 10 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆133Updated 9 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- ☆61Updated 9 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆68Updated 11 years ago
- De Mysteriis Dom jemalloc☆65Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Implementation of the SMM rootkit "The Watcher"☆127Updated 3 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- ☆38Updated 9 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Dynamic security analysis of embedded systems’ firmwares☆81Updated 8 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆132Updated 10 years ago
- A program to draw rectangles from heap traces.☆134Updated 5 years ago
- ☆28Updated 2 years ago
- r2con 2017 September 6-9☆97Updated 7 years ago