☆20Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for setup
Users that are interested in setup are comparing it to the libraries listed below
Sorting:
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- QEMU modified to run CGC binaries.☆13Apr 12, 2022Updated 3 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆19Aug 20, 2016Updated 9 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Documentation for the Mechanical Phish.☆235Aug 21, 2016Updated 9 years ago
- DARPA Cyber Grand Challenge OS syscall library☆19Feb 1, 2017Updated 9 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- ☆27May 29, 2015Updated 10 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Feb 1, 2017Updated 9 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆656Jan 12, 2026Updated 2 months ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆51Feb 9, 2026Updated last month
- No SNMP? No problem! SSH -> collectd☆18Apr 2, 2017Updated 8 years ago
- DARPA Cyber Grand Challenge Challenge Binary Testing tools☆31Jan 24, 2018Updated 8 years ago
- The Z3 Theorem Prover - repository for staging python distributions☆52Jun 10, 2019Updated 6 years ago
- my automatic exploit generation (DEPRECATED)☆60Jun 21, 2016Updated 9 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- Flounder is an old corpus collector I wrote, but it still works. Just need a Bing API key☆17Oct 25, 2019Updated 6 years ago
- AFL, with scripts to support other architectures.☆97Nov 7, 2018Updated 7 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- A repository with binaries for angr tests and examples.☆64Updated this week
- Eliminating Keystroke Timing Attacks☆22Dec 12, 2017Updated 8 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- LLVM trunk with poolalloc trunk modified to compile only DSA☆12Jul 9, 2015Updated 10 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- ☆11Jan 10, 2024Updated 2 years ago
- A dumb afl-fuzz triage tool.☆14Dec 8, 2022Updated 3 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- Implementation of Tagged Memory security policies into Rocket Core☆10Nov 8, 2016Updated 9 years ago
- ☆30May 23, 2017Updated 8 years ago