B2R2-org / B2R2Links
B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.
☆443Updated last week
Alternatives and similar repositories for B2R2
Users that are interested in B2R2 are comparing it to the libraries listed below
Sorting:
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆156Updated 4 years ago
- CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines (NDSS '19)☆241Updated 6 years ago
- Binary code coverage visualizer plugin for Ghidra☆297Updated last year
- Ghidra Program Analysis Library☆347Updated 2 years ago
- BINSEC binary-level open-source platform☆393Updated last month
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- Intermediate Representation for Binary analysis and transformation☆349Updated 3 weeks ago
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆467Updated 2 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆224Updated 7 months ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆736Updated 9 months ago
- A comprehensive binary emulation and instrumentation platform.☆418Updated 3 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆264Updated 3 weeks ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆608Updated 2 years ago
- A repository to store Z3-python scripts you can use as examples, reminders, whatever.☆280Updated 5 years ago
- A fast and accurate disassembler☆738Updated 2 weeks ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is the primary, ca…☆312Updated 3 weeks ago
- The fastest Intel-PT decoder for fuzzing☆377Updated 2 years ago
- An abstraction layer for constraint solvers.☆326Updated this week
- AFL binary instrumentation☆305Updated last year
- ☆400Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆437Updated 9 months ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆166Updated 3 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Updated last year
- Target-centric program analysis.☆76Updated 3 weeks ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Python bindings for Valgrind's VEX IR.☆374Updated this week
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Updated 5 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Updated 7 years ago
- A static binary rewriter that does not use heuristics☆310Updated 7 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆380Updated 7 years ago