zardus / preeny
Some helpful preload libraries for pwning stuff.
☆1,595Updated last month
Alternatives and similar repositories for preeny:
Users that are interested in preeny are comparing it to the libraries listed below
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,910Updated 3 months ago
- The 'exploitable' GDB plugin☆723Updated 2 years ago
- Build a database of libc offsets to simplify exploitation☆1,742Updated 3 months ago
- Driller: augmenting AFL with symbolic execution!☆912Updated 2 years ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,870Updated this week
- Documentation for the angr suite☆837Updated last year
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,245Updated 2 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,125Updated this week
- Set of tests for fuzzing engines☆1,435Updated 3 years ago
- A fork of AFL for fuzzing Windows binaries☆2,389Updated 2 months ago
- AFL/QEMU fuzzing with full-system emulation.☆628Updated 6 years ago
- Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.☆1,265Updated last year
- Visualization of heap operations.☆604Updated 2 months ago
- american fuzzy lop (copy of the source code for easy access)☆608Updated 7 years ago
- a general-purpose fuzzer☆1,276Updated 6 years ago
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,133Updated last month
- Provide powerful tools for seccomp analysis☆1,011Updated this week
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,049Updated 3 weeks ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆1,874Updated 7 months ago
- Checksec☆2,106Updated this week
- cwe_checker finds vulnerable patterns in binary executables☆1,184Updated 2 months ago
- ☆640Updated last week
- gdb for pwn☆906Updated 6 months ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,254Updated 2 years ago
- A powerful static binary rewriting tool☆1,006Updated last month
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆642Updated last week
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆698Updated 9 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,738Updated 4 months ago
- Linux system call fuzzer☆882Updated 5 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,125Updated last year