jhector / breakout
hacklu2014 x86_64 exploitation challenge using DWARF bytecode
☆21Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for breakout
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Updated 7 years ago
- Python wrapper for the Windows CDB Debugger☆19Updated 2 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- Plugins for IDA Pro and Hex-Rays☆40Updated 6 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- ☆18Updated 5 years ago
- Crappy Win32k syscall fuzzer☆13Updated 9 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 5 years ago
- A pin tool to visualise heap operations☆21Updated 9 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- x86 Dynamic Binary Translator Library☆34Updated 3 years ago
- Futile attempt to solve the Tigress challenges using angr☆22Updated 5 years ago
- ☆25Updated 6 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Updated 7 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆28Updated 9 years ago
- idapython scripts☆11Updated 7 years ago
- S2E plugins library☆17Updated 4 years ago
- REIL translation library☆36Updated 8 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- ☆27Updated last year
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Updated 8 years ago