ixty / xarch_shellcodeLinks
Cross Architecture Shellcode in C
☆201Updated 8 years ago
Alternatives and similar repositories for xarch_shellcode
Users that are interested in xarch_shellcode are comparing it to the libraries listed below
Sorting:
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆133Updated 9 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- add symbols back into a stripped ELF binary (~strip)☆172Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- ☆164Updated 8 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- macOS Kernel Fuzzer☆260Updated 7 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆303Updated 10 months ago
- Function redirection via ELF tricks.☆160Updated 9 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- ELF Unstrip Tool☆105Updated 9 years ago
- ☆61Updated 9 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 10 months ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Symbolic Execution Tool in r2☆105Updated 3 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆305Updated 6 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Updated 8 years ago