kevinkoo001 / ropfView external linksLinks
Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack
☆26May 31, 2016Updated 9 years ago
Alternatives and similar repositories for ropf
Users that are interested in ropf are comparing it to the libraries listed below
Sorting:
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- Binary analysis platform based on Octopus and Radare2☆78Nov 7, 2016Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Return Oriented Programme Evolution with ROPER☆171Apr 25, 2019Updated 6 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Jan 11, 2022Updated 4 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- The collection of programs for evaluating fuzzing techniques☆21Nov 27, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- ☆23May 11, 2017Updated 8 years ago
- ☆22Mar 23, 2016Updated 9 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆108Jul 8, 2018Updated 7 years ago
- ☆67May 5, 2021Updated 4 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- ☆90Jul 5, 2016Updated 9 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Semantic Binary Code Analysis Framework☆124Sep 28, 2015Updated 10 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 9 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Jan 10, 2022Updated 4 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 4 years ago