Symbolic execution in radare2 with angr
☆39Jul 27, 2021Updated 4 years ago
Alternatives and similar repositories for modality
Users that are interested in modality are comparing it to the libraries listed below
Sorting:
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- Kernel-based debugger for Linux applications☆75Mar 8, 2022Updated 3 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆12Nov 27, 2025Updated 3 months ago
- A tool that automatically creates fuzzing harnesses based on a library☆284Nov 13, 2021Updated 4 years ago
- Scripts or utilities for radare2☆15Sep 10, 2016Updated 9 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- My ctf-writeups☆12Jan 28, 2019Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- A tool for finding the one gadget RCE in libc☆77May 30, 2020Updated 5 years ago
- ☆20May 30, 2025Updated 9 months ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- A comprehensive binary emulation and instrumentation platform.☆418Jan 31, 2023Updated 3 years ago
- Transfer analysis data between Binary Ninja and IDA☆139Oct 16, 2025Updated 4 months ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆166Dec 5, 2022Updated 3 years ago
- A binary analysis framework☆133Dec 17, 2020Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated last month
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- Python based angr plug in for IDA Pro.☆35Feb 25, 2018Updated 8 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- User configuration for me☆14Oct 19, 2022Updated 3 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆141Aug 17, 2021Updated 4 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆184May 2, 2021Updated 4 years ago
- Code and resources for the paper: "Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs"☆211May 10, 2021Updated 4 years ago
- Hacky scripts to fixup stack strings in Ghidra's decompiler.☆36May 22, 2022Updated 3 years ago
- My RE challenge from Northsec 2018.☆14Jun 1, 2022Updated 3 years ago
- Advanced Programming in the UNIX Environment at NCTU☆18Jul 13, 2019Updated 6 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Aug 6, 2019Updated 6 years ago