0xchase / modalityLinks
Symbolic execution in radare2 with angr
☆39Updated 3 years ago
Alternatives and similar repositories for modality
Users that are interested in modality are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Flex 'em lexers☆40Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆38Updated 4 years ago
- ☆15Updated 5 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- This repository contains the currently implemented angr concrete targets.☆34Updated last year
- Target-centric program analysis.☆76Updated this week
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 6 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- tool for multi-execution jump coverage introspection☆64Updated 4 months ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 5 months ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 4 months ago
- My scripts for Ghidra.☆24Updated 2 years ago
- Collection of images and examples to use with Shoggoth.☆19Updated 4 years ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆20Updated last week
- ☆47Updated 2 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 5 months ago