Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.
☆30Jul 1, 2014Updated 11 years ago
Alternatives and similar repositories for Catfish
Users that are interested in Catfish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆138Sep 27, 2021Updated 4 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.☆19Jan 27, 2011Updated 15 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Some writeups in ctf.☆11Mar 31, 2022Updated 3 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago