s3team / CryptoHuntLinks
☆43Updated 8 years ago
Alternatives and similar repositories for CryptoHunt
Users that are interested in CryptoHunt are comparing it to the libraries listed below
Sorting:
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- ☆53Updated 5 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- run AFL with pintool☆66Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 4 months ago
- ☆87Updated 9 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- ☆66Updated 5 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆89Updated 6 years ago
- ☆49Updated 4 years ago
- ☆98Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- ☆54Updated 4 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago