zhechkoz / PwINLinks
Security Evaluation of Dynamic Binary Instrumentation Engines
☆80Updated 6 years ago
Alternatives and similar repositories for PwIN
Users that are interested in PwIN are comparing it to the libraries listed below
Sorting:
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆87Updated 10 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 4 months ago
- A function tracer☆90Updated 6 years ago
- Futile attempt to solve the Tigress challenges using angr☆23Updated 6 years ago
- ☆47Updated 2 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- ☆53Updated 6 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆63Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- ☆51Updated 7 years ago
- ☆68Updated last year
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- ☆49Updated 4 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- run AFL with pintool☆66Updated 5 years ago