jedisct1 / 6Jack
A framework for analyzing/testing/fuzzing network applications.
☆46Updated 5 years ago
Related projects: ⓘ
- A library for efficient interception of established TCP connections☆19Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆71Updated 5 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 7 years ago
- ☆39Updated 11 years ago
- Stealth's 64bit injectso port☆73Updated 14 years ago
- Statically linked Library detector☆69Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆25Updated 13 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- ☆35Updated 12 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- ☆24Updated 9 years ago
- Automatic ROP chain generator☆11Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- Collection of somewhat useful stuff for CTF events☆37Updated 9 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆45Updated 6 years ago
- Collection of scripts for radare2☆28Updated 5 years ago
- ☆37Updated this week
- OS X rootkit loader version #2☆12Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆12Updated 4 years ago
- Static and Dynamic exploit analysis framework.☆21Updated 10 years ago
- AVX2 Chacha implementation☆16Updated 10 years ago
- ☆13Updated this week
- Translate regular Assembly into Extended Instructions☆85Updated 11 years ago
- trace local function calls like strace and ltrace☆70Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆34Updated 9 years ago
- Block-based software vulnerability fuzzing framework☆47Updated 5 years ago