nneonneo / doublethinkLinks
Doublethink challenge from DEF CON 2018
☆23Updated 5 years ago
Alternatives and similar repositories for doublethink
Users that are interested in doublethink are comparing it to the libraries listed below
Sorting:
- ☆96Updated 6 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- ELF Unstrip Tool☆105Updated 9 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆101Updated last year
- Rewriting functions in compiled binaries using McSema☆89Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- A framework provides an interface to monitor and control fuzzers☆31Updated last year
- ☆17Updated 6 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- ☆53Updated 3 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- ☆63Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- ☆40Updated 7 years ago
- ☆18Updated 5 years ago
- [WIP] pivot a running process into an emulator for instrumentation☆13Updated 8 years ago
- A monitoring script for AFL☆40Updated 8 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆31Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- ☆63Updated 9 years ago