trailofbits / AppJailLauncherLinks
CTF Challenge Framework for Windows 8 and above
☆156Updated 4 years ago
Alternatives and similar repositories for AppJailLauncher
Users that are interested in AppJailLauncher are comparing it to the libraries listed below
Sorting:
- PEDA-like debugger UI for WinDbg☆205Updated last year
- Some new commands debug heap for peda☆100Updated 8 months ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆341Updated 6 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆303Updated last year
- WCTF 2019 challenge☆102Updated 6 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- ☆154Updated 6 years ago
- ☆250Updated 5 years ago
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆213Updated 3 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆309Updated 6 years ago
- Have fun with the LowFragmentationHeap☆252Updated 4 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆212Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- Some CTF write up☆257Updated 3 months ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆171Updated 10 years ago
- ☆200Updated 2 years ago
- SymGDB - symbolic execution plugin for gdb☆218Updated 7 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 10 years ago
- The new phuzzing framework!☆163Updated last year
- ☆286Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆188Updated 4 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago