polymorf / HeapView
Tool to view heap chunks and memory writes (using pintool)
☆39Updated 6 years ago
Alternatives and similar repositories for HeapView:
Users that are interested in HeapView are comparing it to the libraries listed below
- REIL translation library☆36Updated 8 years ago
- A pin tool to visualise heap operations☆21Updated 9 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- ☆49Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆33Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 5 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 8 years ago
- ☆26Updated 8 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- ☆87Updated 9 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- AFL "mostly" ported to cygwin☆26Updated 8 years ago
- Python repository containing parsed standard C library function and argument information☆26Updated 6 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 6 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆63Updated 5 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆27Updated last year
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Memory awesomeness.☆29Updated 9 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆28Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago