reverseame / rop3Links
A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure
☆18Updated 2 years ago
Alternatives and similar repositories for rop3
Users that are interested in rop3 are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆43Updated 2 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A library for patching ELFs☆56Updated 4 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 5 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆19Updated 2 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 4 months ago
- Legacy version of GEF running for GDB+Python2☆19Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- binary ninja related code☆35Updated 3 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- The Dumb Network Fuzzer☆20Updated last year
- ☆12Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A tool to perform so called BGE attack☆24Updated 2 weeks ago
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆27Updated last year
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆42Updated 4 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆47Updated 2 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Updated 4 years ago
- javascript extension of windbg for hacker.☆15Updated 2 years ago
- ☆23Updated 4 months ago