tin-z / GDBleedLinks
Dynamic-Static binary instrumentation framework on top of GDB
☆51Updated last year
Alternatives and similar repositories for GDBleed
Users that are interested in GDBleed are comparing it to the libraries listed below
Sorting:
- weggli ruleset scanner for source code and binaries☆29Updated last month
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆48Updated 2 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 5 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- ☆21Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- Slides about HyperDbg☆30Updated 3 months ago
- WebGL fuzzer☆40Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆65Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆63Updated 4 months ago
- Ghidra analyzer for UEFI firmware.☆19Updated 2 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆62Updated 8 months ago
- ☆12Updated 3 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- ☆32Updated 6 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 9 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- ☆57Updated 2 years ago
- Python bindings for BochsCPU☆36Updated last month
- ☆48Updated 3 years ago
- ☆82Updated 2 years ago