jfoote / exploitable
The 'exploitable' GDB plugin
☆726Updated 2 years ago
Alternatives and similar repositories for exploitable:
Users that are interested in exploitable are comparing it to the libraries listed below
- AFL/QEMU fuzzing with full-system emulation.☆629Updated 6 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆643Updated last month
- Bucket and triage on-disk crashes. OSX and Linux.☆357Updated 5 months ago
- Driller: augmenting AFL with symbolic execution!☆915Updated 2 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆415Updated 6 years ago
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆488Updated 3 years ago
- A TCP/UDP based network daemon fuzzer☆519Updated 9 months ago
- Some helpful preload libraries for pwning stuff.☆1,603Updated 2 months ago
- Visualization of heap operations.☆606Updated 3 months ago
- ☆651Updated 3 weeks ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆602Updated last year
- ☆605Updated 2 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆340Updated 4 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆509Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆578Updated 6 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆506Updated 3 years ago
- Peach is a fuzzing framework which uses a DSL for building fuzzers and an observer based architecture to execute and monitor them.☆408Updated 4 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆525Updated last year
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆700Updated 10 months ago
- american fuzzy lop (copy of the source code for easy access)☆609Updated 7 years ago
- Documentation for the angr suite☆843Updated last year
- Detect, analyze and uniquely identify crashes in Windows applications☆502Updated last month
- binary patching from Python☆634Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆403Updated 3 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆476Updated 8 months ago
- yet another tool for analysing binaries☆476Updated last month
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Updated 5 years ago
- ☆380Updated 5 years ago
- Simplify format string exploitation.☆338Updated 3 years ago
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆544Updated last year