zhechkoz / PwINLinks
Security Evaluation of Dynamic Binary Instrumentation Engines
☆81Updated 7 years ago
Alternatives and similar repositories for PwIN
Users that are interested in PwIN are comparing it to the libraries listed below
Sorting:
- ☆87Updated 10 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- A function tracer☆91Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Futile attempt to solve the Tigress challenges using angr☆22Updated 6 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- integration with IDA☆93Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 10 months ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Updated 4 years ago
- ☆63Updated 8 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 10 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated 2 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- ARG: Automatic ROP chains Generation☆22Updated 6 years ago
- ☆31Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago