Notes on various topics I'm interested in
☆162Mar 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆23Dec 5, 2017Updated 8 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Elevation of privilege detector based on HyperPlatform☆124Mar 5, 2017Updated 9 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- The DrK Attack - Proof of concept☆348Mar 13, 2022Updated 4 years ago
- AFLFast (extends AFL with Power Schedules)☆422Jun 16, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- Survey of program analysis research with a focus on machine code☆565Sep 8, 2020Updated 5 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Feb 24, 2019Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆156May 10, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- PC firmware exploitation tool and library☆260May 13, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆381Feb 5, 2019Updated 7 years ago
- An Android port of radamsa fuzzer☆69Dec 24, 2019Updated 6 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆508May 11, 2021Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Dynamic instrumentation of the Linux kernel☆41Feb 24, 2015Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- deprecated☆46Mar 20, 2019Updated 7 years ago
- A branch-monitor-based solution for process monitoring.☆138Feb 9, 2020Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- ☆74Aug 4, 2022Updated 3 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- ☆12Feb 19, 2017Updated 9 years ago