ivanfratric / ropguard
Runtime Prevention of Return-Oriented Programming Attacks
☆82Updated 9 years ago
Related projects: ⓘ
- Kernel driver to fuzz Hyper-V hypercalls☆135Updated 5 years ago
- ☆87Updated 9 years ago
- A DBI tool to discover heap memory related bugs☆126Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆198Updated 5 months ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆131Updated 8 years ago
- ☆171Updated 5 years ago
- ☆69Updated this week
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 10 years ago
- kernel pool windbg extension☆79Updated 9 years ago
- Some low-level stuff☆103Updated 4 months ago
- Git copy of idapython svn repo: https://code.google.com/p/idapython/☆47Updated 10 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- ☆89Updated 5 years ago
- A branch-monitor-based solution for process monitoring.☆124Updated 4 years ago
- ☆40Updated this week
- ☆47Updated 3 years ago
- ☆59Updated 8 years ago
- QTrace, a "zero knowledge" system call tracer☆50Updated 9 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆70Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆67Updated 3 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆135Updated 3 years ago
- Clone of the IDAPython repo☆24Updated 9 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 2 years ago
- TEMU: The BitBlaze Dynamic Analysis Component (with some patches).☆61Updated 9 years ago
- ☆51Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Use CVE-2016-3308 corrupt win32k desktop heap☆50Updated 8 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆98Updated 4 years ago