nneonneo / doublethinkLinks
Doublethink challenge from DEF CON 2018
☆23Updated 5 years ago
Alternatives and similar repositories for doublethink
Users that are interested in doublethink are comparing it to the libraries listed below
Sorting:
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- ☆96Updated 6 years ago
- ☆18Updated 5 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- ☆40Updated 7 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago
- ☆17Updated 6 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- ☆53Updated 3 years ago
- ☆82Updated 7 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- A framework provides an interface to monitor and control fuzzers☆31Updated last year
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- ☆31Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆94Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆62Updated 4 years ago
- Symbolic Execution over Falcon IL☆29Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆89Updated 5 years ago
- ELF Unstrip Tool☆105Updated 9 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- ☆53Updated 5 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- A monitoring script for AFL☆40Updated 8 years ago
- CRAX: software CRash analysis for Automatic eXploit generation☆49Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago