trailofbits / AppJailLauncherLinks
CTF Challenge Framework for Windows 8 and above
☆155Updated 4 years ago
Alternatives and similar repositories for AppJailLauncher
Users that are interested in AppJailLauncher are comparing it to the libraries listed below
Sorting:
- Some new commands debug heap for peda☆99Updated 3 months ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- WCTF 2019 challenge☆100Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆134Updated 9 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆304Updated 11 months ago
- Have fun with the LowFragmentationHeap☆241Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- ☆248Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆305Updated 6 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆209Updated 2 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- ☆198Updated 2 years ago
- ☆154Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆148Updated 6 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆167Updated 10 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆93Updated 9 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- Function redirection via ELF tricks.☆160Updated 10 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆300Updated 2 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 4 years ago
- Some CTF write up☆246Updated 3 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- ☆284Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆278Updated 4 years ago