mishrasunny174 / SROPLinks
A repository containing sample srop exploits and vulnerable binaries.
☆11Updated 5 years ago
Alternatives and similar repositories for SROP
Users that are interested in SROP are comparing it to the libraries listed below
Sorting:
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆14Updated 2 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆31Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆17Updated 3 years ago
- python and honggfuzz☆25Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- The Dumb Network Fuzzer☆20Updated last year
- Personal pwning toolset developed/used by myself. Use at your own risk.☆17Updated 2 years ago
- A library for patching ELFs☆55Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- ☆47Updated 2 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 5 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Updated 5 years ago