sslab-gatech / DrK
The DrK Attack - Proof of concept
☆342Updated 2 years ago
Alternatives and similar repositories for DrK:
Users that are interested in DrK are comparing it to the libraries listed below
- OS X malloc introspection tool☆321Updated last year
- capstone based disassembler for extracting to binnavi☆227Updated 8 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆247Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆284Updated 8 years ago
- - An Exploit Dev Swiss Army Knife.☆691Updated 3 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- An instruction trace visualisation tool for dynamic program analysis☆370Updated 2 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆281Updated 3 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- Slides and very basic examples☆111Updated 7 years ago
- A tool dedicated to the research of vulnerabilities in hypervisors by creating unusual system configurations.☆185Updated 2 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆319Updated 5 years ago
- An amd64 symbolic emulator☆313Updated 3 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 7 years ago
- Repository to train/learn memory corruption on the ARM platform.☆352Updated 7 years ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- binary patching from Python☆634Updated last year
- Deprecated Binary Ninja prototype written in Python☆521Updated 4 years ago
- This repository contains tools to perform modern cache attacks on ARM.☆286Updated 3 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- A light ELF binary patch tool in python urwid☆145Updated 5 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- A tool to help you write binary exploits☆607Updated 5 years ago
- add symbols back into a stripped ELF binary (~strip)☆170Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆180Updated 8 years ago
- Teach you a binary exploitation for great good.☆294Updated 6 years ago
- Conference slides and White-papers☆356Updated 5 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- PEDA - Python Exploit Development Assistance for GDB☆98Updated 8 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆290Updated 7 years ago