- London, UK
- https://symeonp.github.io/
Stars
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
A True Instrumentable Binary Emulation Framework
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-m…
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
A fork of AFL for fuzzing Windows binaries
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…
Gdbinit for OS X, iOS and others - x86, x86_64 and ARM
A Coverage Explorer for Reverse Engineers
Loading Remote AES Encrypted PE in memory , Decrypted it and run it
Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
Grinder is a system to automate the fuzzing of web browsers and the management of a large number of crashes.
Snapshot-based coverage-guided windows kernel fuzzer
arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system
PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components
Full-chain RCE exploit for Source Engine games
Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS
Some C++ example code to demonstrate how to perform code similarity searches using SimHashing.
This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.
AFL + DynamoRIO = fuzzing binaries with no source code on Linux
AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.