nccgroup / libptmalloc
Heap analysis tooling for ptmalloc
☆44Updated 2 years ago
Alternatives and similar repositories for libptmalloc:
Users that are interested in libptmalloc are comparing it to the libraries listed below
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Heap analysis tooling for dlmalloc☆30Updated 2 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- ☆60Updated 9 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- BPF Processor for IDA Python☆51Updated 6 years ago
- Code coverage analysis tools for the PIN Toolkit☆59Updated 11 years ago
- Tool to view heap chunks and memory writes (using pintool)☆39Updated 6 years ago
- A monitoring script for AFL☆39Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- ☆17Updated 5 years ago
- ☆87Updated 9 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- A library for GDB (with python support), that adds useful functions to the standard 'gdb' library.☆78Updated 13 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- Using LibVMI to detect malware☆31Updated 3 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- A generated corpus, seed, and target for a fuzz job☆59Updated 9 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- A smart file fuzzer.☆26Updated 8 years ago
- De Mysteriis Dom jemalloc☆65Updated 7 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- ☆31Updated 7 years ago
- Resources for reverse engineering Go binaries☆41Updated 10 years ago
- Code samples used for the blog post☆24Updated 8 years ago