joxeankoret / membugtoolLinks
A DBI tool to discover heap memory related bugs
☆126Updated 7 years ago
Alternatives and similar repositories for membugtool
Users that are interested in membugtool are comparing it to the libraries listed below
Sorting:
- ☆89Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆69Updated 7 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆127Updated last year
- run AFL with pintool☆66Updated 5 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆71Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- ☆87Updated 10 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 11 months ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Updated 7 years ago
- integration with IDA☆94Updated 4 years ago
- PEDA-like debugger UI for WinDbg☆206Updated last year
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- A function tracer☆92Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Updated 7 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79Updated 9 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- WCTF 2019 challenge☆103Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 9 years ago
- IDA cLEMENCy Tools☆63Updated 8 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆213Updated 4 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- ☆181Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Updated 4 years ago
- haze binary fuzzer☆56Updated last year
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago