koczkatamas / gdb-reattach-plugin
GDB command for reattaching to the new instance of the process (help exploit development)
☆12Updated 8 years ago
Alternatives and similar repositories for gdb-reattach-plugin:
Users that are interested in gdb-reattach-plugin are comparing it to the libraries listed below
- Cross-Qt compatibility module for IDAPython.☆13Updated 5 years ago
- This repository is for binaries that are currently being worked on to be solved by angr.☆11Updated 7 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Updated 8 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- ☆16Updated 7 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Updated 11 years ago
- Toy binaries to play with -fsanitize=safe-stack/cfi☆9Updated 9 years ago
- Python module to detect, analyze and id application bugs☆21Updated 6 months ago
- ☆13Updated 8 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Symbol REPL☆31Updated 6 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 9 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- A tiny tool to learn the assembly code☆11Updated 7 years ago
- Slack bot to assemble and disassemble using Capstone and Keystone☆11Updated 5 years ago
- Tool for working with memory of a running Linux process☆11Updated 4 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆24Updated 3 years ago
- ☆12Updated 7 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- ☆8Updated 8 years ago
- Plugin Manager for IDA Pro☆9Updated 9 years ago