0xAlexei / INFILTRATE2019
INFILTRATE 2019 Demo Materials
☆341Updated last year
Alternatives and similar repositories for INFILTRATE2019:
Users that are interested in INFILTRATE2019 are comparing it to the libraries listed below
- Discovering vulnerabilities in firmware through concolic analysis and function clustering.☆477Updated 4 years ago
- Daenerys: A framework for interoperability between IDA and Ghidra☆300Updated 5 years ago
- Ghidra Program Analysis Library☆332Updated last year
- ☆224Updated last year
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆384Updated last year
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆453Updated last year
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆342Updated 5 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆157Updated 5 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆340Updated 4 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆502Updated 3 weeks ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆385Updated 2 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆602Updated last year
- ☆105Updated 5 years ago
- Binary code coverage visualizer plugin for Ghidra☆289Updated 8 months ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆246Updated 5 years ago
- IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices☆679Updated 5 years ago
- A Binary Ninja plugin for vulnerability research.☆289Updated 6 months ago
- Code and exercises for a workshop on z3 and angr☆225Updated 4 years ago
- Scripts and cheatsheets for IDAPython☆661Updated last year
- Using Intel's PIN tool to solve CTF problems☆497Updated 4 years ago
- Use angr in Ghidra☆571Updated 7 months ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆296Updated 2 years ago
- Scripts for Binary Ninja☆254Updated last year
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆398Updated 2 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆222Updated 4 years ago
- Cross Platform Kernel Fuzzer Framework☆449Updated 6 years ago
- IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database☆530Updated last year
- Linux Heap Exploitation Practice☆378Updated 6 years ago
- How to build an efficient pwn development environment in 2020☆260Updated 4 years ago