A pip wrapper around our ridiculous amount of qemu forks.
☆51Feb 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for shellphish-qemu
Users that are interested in shellphish-qemu are comparing it to the libraries listed below
Sorting:
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 4 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- AFL, with scripts to support other architectures.☆97Nov 7, 2018Updated 7 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- ☆27May 29, 2015Updated 10 years ago
- QEMU modified to run CGC binaries.☆13Apr 12, 2022Updated 3 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆265Jan 13, 2026Updated last month
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆654Jan 12, 2026Updated last month
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- Driller: augmenting AFL with symbolic execution!☆964Mar 24, 2025Updated 11 months ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆56Sep 9, 2015Updated 10 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆19Aug 20, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- ☆26Jan 18, 2026Updated last month
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- A patched version of VEX to work with PyVEX.☆113Feb 1, 2026Updated last month
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆109Jul 26, 2016Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- A collection of extensions to angr to handle new platforms☆69Nov 21, 2025Updated 3 months ago
- ☆43Jul 2, 2018Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Documentation for the Mechanical Phish.☆235Aug 21, 2016Updated 9 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Range Traffic Generator - Used to simulate browsing traffic on a range.☆11May 24, 2017Updated 8 years ago
- 微软7月布丁增加 内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago