ARG: Automatic ROP chains Generation
☆21Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for auto_rop
Users that are interested in auto_rop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some writeups in ctf.☆11Mar 31, 2022Updated 3 years ago
- Unicorn emulator plugin for Dwarf☆18Aug 4, 2019Updated 6 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- CVE-2020-8597 pppd buffer overflow poc☆49Mar 12, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 3 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Frida Python Tool☆14Sep 29, 2020Updated 5 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Window Executable file Function tracer using Debugging API☆44Sep 26, 2019Updated 6 years ago
- Nintendo switch emulator for android☆16Jun 13, 2020Updated 5 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Sep 20, 2022Updated 3 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- metamorphic engine in python☆34Sep 8, 2016Updated 9 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Small script to assemble/disassemble from CLI☆23Aug 15, 2022Updated 3 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆14Nov 8, 2019Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Simple x64dbg plugin to show registers on every step.☆16Jul 27, 2019Updated 6 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆16Feb 12, 2025Updated last year
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- ☆10Mar 6, 2026Updated 3 weeks ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- GryphonCTF 2016 Challenges Repository.☆17Sep 30, 2017Updated 8 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- PoC for a taint based attack on VMProtect☆123Jul 3, 2019Updated 6 years ago