mechaphish / setup
☆19Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for setup
- Our backup exploitation technique: fuzzing for POVs!☆25Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆48Updated 9 months ago
- Concolic tracer to detect flag leaks and create Type-2 POVs.☆13Updated 2 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 4 years ago
- Python concolic execution framework for program analysis☆65Updated 10 years ago
- Library for creating CTF services.☆75Updated 8 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆45Updated 2 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆43Updated 8 years ago
- ☆75Updated 4 months ago
- OpenVPN is an open source VPN daemon☆32Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆160Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆110Updated 8 years ago
- Memory awesomeness.☆29Updated 9 years ago
- ☆36Updated 2 years ago
- A pip wrapper around AFL.☆84Updated 3 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆18Updated 8 years ago
- ☆61Updated 9 years ago
- libfuzzerfication - fuzzing for the rest of us!☆62Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆89Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆169Updated 9 years ago
- Format string exploitation helper☆45Updated 9 years ago
- ☆38Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago