joxeankoret / membugtoolLinks
A DBI tool to discover heap memory related bugs
☆125Updated 7 years ago
Alternatives and similar repositories for membugtool
Users that are interested in membugtool are comparing it to the libraries listed below
Sorting:
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- ☆87Updated 10 years ago
- ☆89Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- A function tracer☆91Updated 6 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79Updated 9 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆71Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 10 months ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- A user-friendly fuzzing and crash triage tool for Windows☆132Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆127Updated last year
- PEDA-like debugger UI for WinDbg☆205Updated last year
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Updated 4 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆86Updated 9 years ago
- ☆91Updated 6 years ago