mechaphish / pov_fuzzingView external linksLinks
Our backup exploitation technique: fuzzing for POVs!
☆24Aug 20, 2016Updated 9 years ago
Alternatives and similar repositories for pov_fuzzing
Users that are interested in pov_fuzzing are comparing it to the libraries listed below
Sorting:
- QEMU modified to run CGC binaries.☆13Apr 12, 2022Updated 3 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆19Aug 20, 2016Updated 9 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆52Updated this week
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- ☆18Feb 26, 2018Updated 7 years ago
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- Syscall Firewalls for VM Isolation☆11May 31, 2017Updated 8 years ago
- Binary Ninja Plugin for devi - see https://github.com/murx-/devi/ for devi details☆20Jan 17, 2024Updated 2 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- ☆27May 29, 2015Updated 10 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 10 months ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Documentation for the Mechanical Phish.☆235Aug 21, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- Secure Coding Validation Suite☆16Jun 5, 2019Updated 6 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Python bindings for Shimple/Jimple IR from Soot.☆42Feb 5, 2026Updated last week
- XProtect configuration files stats☆21Dec 1, 2017Updated 8 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆647Apr 30, 2019Updated 6 years ago