o-o-overflow / dc2019q-hotelcalifornia-publicLinks
☆13Updated 6 years ago
Alternatives and similar repositories for dc2019q-hotelcalifornia-public
Users that are interested in dc2019q-hotelcalifornia-public are comparing it to the libraries listed below
Sorting:
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- ☆17Updated 6 years ago
- BPF Processor for IDA Python☆53Updated 7 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- ☆31Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 7 years ago
- Tools released in CSS 2019☆38Updated 6 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Updated 9 years ago
- run AFL with pintool☆66Updated 5 years ago
- Dynamic Control Flow Recovery☆25Updated 7 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- ☆31Updated 8 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Futile attempt to solve the Tigress challenges using angr☆22Updated 6 years ago
- [CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow☆36Updated 7 years ago
- ☆63Updated 8 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 10 years ago
- Recover control flow graph from obfuscated codes☆38Updated 10 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- A DBI tool to discover heap memory related bugs☆126Updated 7 years ago
- ☆30Updated 7 years ago