felixwilhelm / xenpwn
Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization
☆144Updated 8 years ago
Alternatives and similar repositories for xenpwn:
Users that are interested in xenpwn are comparing it to the libraries listed below
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- ☆104Updated 9 years ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆171Updated 10 years ago
- ☆60Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- ☆28Updated 2 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- A program to draw rectangles from heap traces.☆132Updated 5 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆93Updated 7 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Dynamic security analysis of embedded systems’ firmwares☆80Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 2 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- Python concolic execution framework for program analysis☆65Updated 10 years ago
- ☆62Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- De Mysteriis Dom jemalloc☆64Updated 7 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆111Updated 8 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- Routines for hunting down kernel symbols.☆82Updated 13 years ago
- ☆82Updated 7 years ago
- ☆85Updated 4 years ago