mishrasunny174 / SROPView external linksLinks
A repository containing sample srop exploits and vulnerable binaries.
☆12Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for SROP
Users that are interested in SROP are comparing it to the libraries listed below
Sorting:
- Writeup oriented CTF☆22Nov 6, 2017Updated 8 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆11Dec 18, 2017Updated 8 years ago
- ☆17Nov 12, 2019Updated 6 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆26Feb 2, 2026Updated 2 weeks ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Mar 30, 2019Updated 6 years ago
- Demangles C++ symbol names genarated by Microsoft Visual C++ in order to retrieve the original C++ declarations.☆33Jun 25, 2020Updated 5 years ago
- C implementation of TOTP to generate 2FA code like Google Authentificator.☆21Jun 15, 2021Updated 4 years ago
- A TrustedBSD module to control execution of binaries with suid bit set☆38Oct 3, 2014Updated 11 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Oct 11, 2023Updated 2 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆32Mar 3, 2024Updated last year
- ☆35Jan 27, 2025Updated last year
- idenLib (Library Function Identification) plugin for x32dbg☆41Feb 26, 2019Updated 6 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- SnatchBox (CVE-2020-27935) is a sandbox escape vulnerability and exploit affecting macOS up to version 10.15.x☆32Dec 18, 2020Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆55May 21, 2025Updated 8 months ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- An opinionated tool to create amazing presentations☆38Jan 28, 2023Updated 3 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Astronomy themed 2048 clone☆19Sep 26, 2018Updated 7 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- ☆90Jun 15, 2022Updated 3 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54May 26, 2025Updated 8 months ago