jbrower95 / crop
ROP Payload Compiler
☆11Updated 7 years ago
Alternatives and similar repositories for crop:
Users that are interested in crop are comparing it to the libraries listed below
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Updated 6 years ago
- IDApro idc and idapython script collection☆28Updated last year
- Cross-Qt compatibility module for IDAPython.☆13Updated 5 years ago
- ☆15Updated 9 years ago
- Random Codes Related to Reverse Engineering☆10Updated 2 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 7 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Tools for IDA☆13Updated 8 years ago
- ☆16Updated 4 years ago
- IDA Pro Plugins☆19Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- idapython scripts☆11Updated 7 years ago
- ☆14Updated 7 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- Toy binaries to play with -fsanitize=safe-stack/cfi☆9Updated 9 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Plugins for IDA Pro and Hex-Rays☆41Updated 6 years ago
- ☆13Updated 8 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Updated 8 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- ☆9Updated 6 years ago
- S2E plugins library☆17Updated 5 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago