hacklu2014 x86_64 exploitation challenge using DWARF bytecode
☆22Oct 23, 2014Updated 11 years ago
Alternatives and similar repositories for breakout
Users that are interested in breakout are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple Simulator of ARMv6m instructions☆18May 23, 2017Updated 8 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- ☆38Dec 17, 2012Updated 13 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago
- Clone of the IDAPython repo☆23Mar 16, 2015Updated 11 years ago
- A modified pycparser to parse 010 templates☆54Jan 5, 2020Updated 6 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- Python concolic execution framework for program analysis☆67Nov 13, 2014Updated 11 years ago
- Imports MSDN documentation into IDA Pro☆52Jan 10, 2012Updated 14 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- ☆18Jul 17, 2015Updated 10 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- FakeDRM - userspace DRM emulation library☆12Oct 26, 2014Updated 11 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆31Jun 24, 2015Updated 10 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Patches to the Nexus 6 (Shamu) kernel source to allow KGDB over serial debug cable☆32Mar 11, 2019Updated 7 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- GCC Obfuscation Augmentation Tools☆81Aug 27, 2023Updated 2 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Jul 12, 2015Updated 10 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- [SwiftUI] Pog can track your location regardless of application state (foreground/background/not-running)☆10Jan 20, 2024Updated 2 years ago
- ☆51Mar 23, 2018Updated 8 years ago
- Universal keyboard navigation for GUI-based systems & software☆20May 13, 2020Updated 5 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- DRAKVUF Black-box Binary Analysis☆15Feb 26, 2026Updated 3 weeks ago
- ☆19Mar 16, 2017Updated 9 years ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆154Sep 21, 2018Updated 7 years ago