FSecureLABS / z3_and_angr_binary_analysis_workshopLinks
Code and exercises for a workshop on z3 and angr
☆234Updated 5 years ago
Alternatives and similar repositories for z3_and_angr_binary_analysis_workshop
Users that are interested in z3_and_angr_binary_analysis_workshop are comparing it to the libraries listed below
Sorting:
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆223Updated 7 months ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆214Updated 4 years ago
- ☆188Updated 10 months ago
- ☆112Updated 6 years ago
- Binary code coverage visualizer plugin for Ghidra☆297Updated last year
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆306Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆198Updated last year
- The new phuzzing framework!☆164Updated last year
- SALT - SLUB ALlocator Tracer for the Linux kernel☆156Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆206Updated last year
- ☆136Updated 4 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆78Updated 5 years ago
- Some helper scripts to set up an environment for angr development.☆123Updated this week
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆214Updated 3 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated last year
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- ☆200Updated 2 years ago
- GlibC Malloc for Exploiters presentation☆152Updated 6 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Updated 2 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆166Updated 3 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆387Updated 2 years ago
- ☆185Updated 3 years ago