0xAlexei / INFILTRATE2019Links
INFILTRATE 2019 Demo Materials
☆342Updated 2 years ago
Alternatives and similar repositories for INFILTRATE2019
Users that are interested in INFILTRATE2019 are comparing it to the libraries listed below
Sorting:
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 5 years ago
- Daenerys: A framework for interoperability between IDA and Ghidra☆305Updated 6 years ago
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- ☆112Updated 6 years ago
- Binary code coverage visualizer plugin for Ghidra☆295Updated last year
- Ghidra Program Analysis Library☆345Updated 2 years ago
- Code and exercises for a workshop on z3 and angr☆233Updated 4 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆517Updated 6 months ago
- ☆227Updated 2 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- Scripts for Binary Ninja☆258Updated 2 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆387Updated 2 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆465Updated 2 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆387Updated 2 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆408Updated 3 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆682Updated 6 years ago
- A comprehensive binary emulation and instrumentation platform.☆417Updated 2 years ago
- A Binary Ninja plugin for vulnerability research.☆298Updated last year
- A set of exploitation/reversing aids for IDA☆421Updated 8 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆304Updated 2 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 5 years ago
- IDA plugins and scripts for analyzing register usage frame☆181Updated 2 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Updated 5 years ago