Modern Memory Safety in C/C++
☆1,217Aug 1, 2016Updated 9 years ago
Alternatives and similar repositories for mms
Users that are interested in mms are comparing it to the libraries listed below
Sorting:
- Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.☆1,297Jun 29, 2023Updated 2 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- A repository for learning various heap exploitation techniques.☆8,455Jan 15, 2026Updated last month
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆418Jun 6, 2018Updated 7 years ago
- Some helpful preload libraries for pwning stuff.☆1,645May 22, 2025Updated 9 months ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago
- ☆236May 31, 2018Updated 7 years ago
- A collection of links related to Linux kernel security and exploitation☆6,346Jan 26, 2026Updated last month
- Detect, analyze and uniquely identify crashes in Windows applications☆521May 23, 2025Updated 9 months ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- A fork of AFL for fuzzing Windows binaries☆2,534Dec 5, 2025Updated 2 months ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,310Jan 6, 2026Updated last month
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- A collection of JavaScript engine CVEs with PoCs☆2,314Sep 3, 2019Updated 6 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,277Oct 7, 2022Updated 3 years ago
- A Coverage Explorer for Reverse Engineers☆2,500Feb 14, 2026Updated 2 weeks ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.☆3,063Aug 31, 2021Updated 4 years ago
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated last year
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,612Jun 11, 2025Updated 8 months ago
- Survey of program analysis research with a focus on machine code☆565Sep 8, 2020Updated 5 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled …☆2,895Oct 23, 2020Updated 5 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- Generation-based, context-free grammar fuzzer. Refer to https://github.com/posidron/dharma for a maintained version.☆494Aug 13, 2021Updated 4 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- ☆79May 13, 2016Updated 9 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- IDA Pro Instruction Reference Plugin☆649Oct 20, 2021Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year