hacklu2014 x86_64 exploitation challenge using DWARF bytecode
☆22Oct 23, 2014Updated 11 years ago
Alternatives and similar repositories for breakout
Users that are interested in breakout are comparing it to the libraries listed below
Sorting:
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- ☆38Dec 17, 2012Updated 13 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Dec 23, 2018Updated 7 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- ☆18Jul 17, 2015Updated 10 years ago
- enable kmem without rebooting☆23May 6, 2012Updated 13 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆30Jun 24, 2015Updated 10 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- Enabling KGDB over USB for Android☆52Jul 20, 2010Updated 15 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago
- DRAKVUF Black-box Binary Analysis☆15Updated this week
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- USENIX - Vault'19: BPF programming Tutorial "Performance Analysis in Linux Storage Stack with BPF"☆18Feb 26, 2019Updated 7 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- vendor☆17Feb 7, 2017Updated 9 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- Common codebase for userland application ROP with Nintendo 3DS.☆26Jan 8, 2017Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Vivisect Structure Definition/Parsing Library☆23Jul 25, 2017Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Oct 26, 2015Updated 10 years ago
- ☆19Mar 16, 2017Updated 8 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Apr 24, 2016Updated 9 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- ☆19Dec 28, 2021Updated 4 years ago