gamozolabs / vectorized_emulation_recon_2019Links
Gave a talk on Vectorized emulation at Recon Montreal 2019, here are the slides
☆17Updated 5 years ago
Alternatives and similar repositories for vectorized_emulation_recon_2019
Users that are interested in vectorized_emulation_recon_2019 are comparing it to the libraries listed below
Sorting:
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆87Updated last year
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- ☆27Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- ☆15Updated 5 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- vasilisk☆19Updated 5 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago
- Flex 'em lexers☆40Updated 4 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆19Updated 3 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- haze binary fuzzer☆53Updated last year
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 6 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- Collection of images and examples to use with Shoggoth.☆19Updated 4 years ago
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Updated last year