trailofbits / AppJailLauncherLinks
CTF Challenge Framework for Windows 8 and above
☆156Updated 4 years ago
Alternatives and similar repositories for AppJailLauncher
Users that are interested in AppJailLauncher are comparing it to the libraries listed below
Sorting:
- Some new commands debug heap for peda☆100Updated 9 months ago
- PEDA-like debugger UI for WinDbg☆206Updated last year
- WCTF 2019 challenge☆103Updated 6 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago
- ☆154Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- ☆251Updated 5 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 10 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆69Updated 7 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆214Updated 3 years ago
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆306Updated last year
- An interactive memory info for pwning / exploiting☆98Updated 2 years ago
- Some CTF write up☆255Updated 4 months ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆212Updated 4 years ago
- Have fun with the LowFragmentationHeap☆252Updated 4 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- ☆89Updated 7 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆171Updated 10 years ago
- A DBI tool to discover heap memory related bugs☆126Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Updated 6 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 5 years ago
- SymGDB - symbolic execution plugin for gdb☆218Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆255Updated 8 years ago
- ☆200Updated 2 years ago
- ☆285Updated 5 years ago