jfoote / exploitableLinks
The 'exploitable' GDB plugin
☆743Updated 3 years ago
Alternatives and similar repositories for exploitable
Users that are interested in exploitable are comparing it to the libraries listed below
Sorting:
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆651Updated 3 months ago
- AFL/QEMU fuzzing with full-system emulation.☆638Updated 7 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆356Updated last year
- Driller: augmenting AFL with symbolic execution!☆954Updated 6 months ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆417Updated 7 years ago
- Visualization of heap operations.☆614Updated 10 months ago
- A TCP/UDP based network daemon fuzzer☆522Updated last year
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- ☆720Updated last month
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆493Updated 4 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆514Updated 4 months ago
- ☆616Updated 2 years ago
- Some helpful preload libraries for pwning stuff.☆1,630Updated 5 months ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆530Updated 2 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆508Updated 4 years ago
- american fuzzy lop (copy of the source code for easy access)☆607Updated 7 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆483Updated last year
- Documentation for the angr suite☆845Updated 2 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆725Updated 5 months ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆336Updated 5 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,264Updated 3 years ago
- Using Intel's PIN tool to solve CTF problems☆500Updated 5 years ago
- Simplify format string exploitation.☆343Updated 3 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆519Updated 3 years ago
- binary patching from Python☆637Updated 2 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆585Updated 6 years ago
- jemalloc heap exploitation framework☆459Updated 3 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆647Updated 6 years ago
- Fuzzing framework written in python☆432Updated last year
- Fix stack addresses (when no ASLR) with and without debugging☆181Updated 10 years ago