Automated Exploit generation with WinDBG
☆190Oct 18, 2016Updated 9 years ago
Alternatives and similar repositories for exploit_generator
Users that are interested in exploit_generator are comparing it to the libraries listed below
Sorting:
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- IDA PDB Loader☆49Sep 21, 2018Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 11 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Jul 22, 2016Updated 9 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆523May 23, 2025Updated 9 months ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- ☆45Feb 24, 2018Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆99Nov 26, 2016Updated 9 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆656Jan 12, 2026Updated 2 months ago