lyonys / ARMCoderLinks
The ultimate tool to crafting your ARM shell code
☆10Updated 9 years ago
Alternatives and similar repositories for ARMCoder
Users that are interested in ARMCoder are comparing it to the libraries listed below
Sorting:
- ☆26Updated 9 years ago
- A Modern Approach☆10Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- CVE-2018-4330 POC for iOS☆18Updated 6 years ago
- ☆43Updated 6 years ago
- ☆39Updated 4 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- PoC code for CVE-2018-9539☆19Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 9 years ago
- OpenType font file format fuzzer for Windows☆52Updated 12 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆27Updated 8 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆26Updated 13 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- ☆26Updated 8 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- A fuzz job for ClamAV☆31Updated 9 years ago
- ☆22Updated 7 years ago
- A fuzzing script for MitmProxy☆22Updated 10 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago