lunixbochs / patchkitLinks
binary patching from Python
☆637Updated 2 years ago
Alternatives and similar repositories for patchkit
Users that are interested in patchkit are comparing it to the libraries listed below
Sorting:
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆651Updated 3 months ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆761Updated 3 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆508Updated 4 years ago
- yet another tool for analysing binaries☆486Updated 8 months ago
- lscan is a library identification tool on statically linked/stripped binaries☆405Updated 4 years ago
- Visualization of heap operations.☆614Updated 10 months ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆647Updated 6 years ago
- jemalloc heap exploitation framework☆460Updated 3 years ago
- Simplify format string exploitation.☆343Updated 3 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆407Updated 3 years ago
- AFL/QEMU fuzzing with full-system emulation.☆638Updated 7 years ago
- Repository to train/learn memory corruption on the ARM platform.☆357Updated 8 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆417Updated 7 years ago
- A Miasm2 based function divination.☆541Updated 5 years ago
- A Return-oriented Programming toolkit☆352Updated 8 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆514Updated 5 months ago
- Pure Python parser and analyzer for IDA Pro database files (.idb).☆484Updated 5 months ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆262Updated 2 months ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆322Updated 6 years ago
- Using Intel's PIN tool to solve CTF problems☆500Updated 5 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆357Updated 6 years ago
- A set of exploitation/reversing aids for IDA☆420Updated 7 years ago
- ☆385Updated 5 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 10 years ago
- ☆720Updated last month
- Documentation for the angr suite☆845Updated 2 years ago
- Dynamic IDA Enrichment☆473Updated 3 years ago
- The 'exploitable' GDB plugin☆743Updated 3 years ago