samuraictf / gatekeeperLinks
GATEKEEPER: Inline and on-target defense
☆121Updated 2 years ago
Alternatives and similar repositories for gatekeeper
Users that are interested in gatekeeper are comparing it to the libraries listed below
Sorting:
- An open source, multi-architecture ROP compiler written in python☆162Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated last month
- ☆159Updated 10 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆179Updated 9 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Updated 8 years ago
- A collection of more than 1000 binary libc files☆88Updated 10 years ago
- A light ELF binary patch tool in python urwid☆147Updated 5 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- Semantic Binary Code Analysis Framework☆124Updated 9 years ago
- CTF writeups☆113Updated 7 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆37Updated 9 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 11 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- ☆76Updated last year
- Repository to train/learn memory corruption on the ARM platform.☆355Updated 8 years ago
- ☆163Updated 8 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- Radare Congress Stuff☆212Updated 7 months ago
- ☆72Updated 6 years ago
- Slides and very basic examples☆112Updated 8 years ago
- ☆235Updated 7 years ago
- PEDA - Python Exploit Development Assistance for GDB☆97Updated 8 years ago
- Release Branches for MoFlow☆305Updated 9 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- ☆21Updated 7 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆92Updated 9 years ago