0vercl0k / z3-playground
A repository to store Z3-python scripts you can use as examples, reminders, whatever.
☆277Updated 4 years ago
Alternatives and similar repositories for z3-playground:
Users that are interested in z3-playground are comparing it to the libraries listed below
- An abstraction layer for constraint solvers.☆299Updated this week
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆254Updated last month
- A static binary rewriter that does not use heuristics☆303Updated 6 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆140Updated 5 years ago
- The Jakstab static analysis platform for binaries☆158Updated 5 years ago
- Python bindings for Valgrind's VEX IR.☆348Updated this week
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Function redirection via ELF tricks.☆157Updated 9 years ago
- Code and exercises for a workshop on z3 and angr☆225Updated 4 years ago
- SymGDB - symbolic execution plugin for gdb☆215Updated 6 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆354Updated 4 months ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆186Updated 3 years ago
- ☆236Updated 6 years ago
- ☆248Updated 5 years ago
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆284Updated 5 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆490Updated 6 months ago
- A taint-tracking plugin for the Valgrind memory checking tool☆258Updated last year
- Cream of the Crop Pwning Challenges☆31Updated 5 years ago
- ☆648Updated 2 weeks ago
- Infrastructure for Reassembleable Disassembling and Transformation☆198Updated 2 months ago
- ☆144Updated last year
- HeapHopper is a bounded model checking framework for Heap-implementations☆214Updated 5 months ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆222Updated 4 years ago
- ☆159Updated 10 years ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆215Updated last year
- Fix stack addresses (when no ASLR) with and without debugging☆180Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆243Updated 5 years ago
- Implementations of program analysis tools with a focus on machine code☆208Updated 10 years ago