trailofbits / bisc
Borrowed Instructions Synthetic Computation
☆70Updated 9 years ago
Alternatives and similar repositories for bisc:
Users that are interested in bisc are comparing it to the libraries listed below
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 10 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- Memory awesomeness.☆29Updated 9 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 5 years ago
- Python module to detect, analyze and id application bugs☆21Updated 6 months ago
- ☆26Updated 8 years ago
- Fuzzer☆43Updated 10 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆45Updated 2 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Updated 8 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆91Updated 7 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 10 years ago
- ☆38Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆30Updated 6 years ago
- covFuzz☆34Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 8 years ago
- Some slides from some presentations I have given☆25Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- ☆49Updated 6 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 11 years ago