wy666444 / auto_ropLinks
ARG: Automatic ROP chains Generation
☆22Updated 5 years ago
Alternatives and similar repositories for auto_rop
Users that are interested in auto_rop are comparing it to the libraries listed below
Sorting:
- Some writeups in ctf.☆11Updated 3 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Updated 5 years ago
- ghidra scripts☆15Updated 4 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Updated 6 years ago
- by http://whereisk0shl.top/☆35Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- How to get a linux kernel debug environment☆32Updated 7 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- ☆74Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 6 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- forked from afl http://lcamtuf.coredump.cx/afl/☆8Updated 6 years ago
- Magellan PoC☆34Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- Collection of interesting pwnables.☆5Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Updated 5 years ago
- ☆31Updated 5 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- ☆31Updated 7 years ago
- ☆36Updated 6 years ago