Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.
☆30Jul 1, 2014Updated 11 years ago
Alternatives and similar repositories for Catfish
Users that are interested in Catfish are comparing it to the libraries listed below
Sorting:
- ☆13Jun 25, 2016Updated 9 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- ☆138Sep 27, 2021Updated 4 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Pintool to detect Read before Write memory access☆21Mar 20, 2013Updated 12 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- libtalloc is a python script for use with GDB that can be used to analyse the "trivial allocator" (talloc)☆17Aug 6, 2015Updated 10 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- An implementation of an extension of the Local Descriptors Encoded by Fisher Vectors method for person re-identification.☆13Nov 30, 2014Updated 11 years ago