zzcentury / Exploit-Re
☆29Updated 3 years ago
Alternatives and similar repositories for Exploit-Re:
Users that are interested in Exploit-Re are comparing it to the libraries listed below
- ☆39Updated 4 years ago
- 搜集的一些kernel paper☆25Updated 5 years ago
- angr源码分析☆33Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- linux system call hook framework☆47Updated 6 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- Collection of interesting pwnables.☆3Updated 6 years ago
- Various debugging tools such as %DumpObjects for v8☆53Updated 6 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- ☆31Updated last year
- ghidra scripts☆15Updated 4 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- ☆11Updated 5 years ago
- qemu vulnerablity.☆50Updated 3 years ago
- afl源码分析☆13Updated 6 years ago
- This is an IDA plugin to recover class information from C++ binary.☆17Updated 4 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- ☆27Updated 5 months ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆9Updated last month
- ☆14Updated 4 years ago
- ☆44Updated 4 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆52Updated 2 months ago
- some useful scripts to solve pwn challenges in ctfs☆13Updated 4 years ago
- ☆34Updated 3 years ago
- An IDA processor for eBPF bytecode☆62Updated 4 months ago
- 基于angr的污点分析引擎☆39Updated 5 years ago
- ☆21Updated 4 years ago
- 学习angr用,里面可能啥都有☆10Updated 5 years ago