FSecureLABS / z3_and_angr_binary_analysis_workshop
Code and exercises for a workshop on z3 and angr
☆225Updated 4 years ago
Alternatives and similar repositories for z3_and_angr_binary_analysis_workshop:
Users that are interested in z3_and_angr_binary_analysis_workshop are comparing it to the libraries listed below
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆296Updated 2 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆214Updated 5 months ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆206Updated 3 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆300Updated 6 months ago
- The new phuzzing framework!☆155Updated 8 months ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆246Updated 5 years ago
- ☆105Updated 5 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆254Updated last month
- SALT - SLUB ALlocator Tracer for the Linux kernel☆149Updated 6 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆183Updated 11 months ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆203Updated 2 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 2 months ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆140Updated 5 years ago
- Binary code coverage visualizer plugin for Ghidra☆289Updated 8 months ago
- Cream of the Crop Pwning Challenges☆31Updated 5 years ago
- SymGDB - symbolic execution plugin for gdb☆215Updated 6 years ago
- ☆129Updated 5 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆270Updated 4 years ago
- ☆193Updated last year
- ☆186Updated 3 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- Some helper scripts to set up an environment for angr development.☆118Updated 4 months ago
- PEDA-like debugger UI for WinDbg☆202Updated 11 months ago
- Source code of HAL-fuzz☆144Updated 4 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆334Updated 5 years ago
- Ghidra Program Analysis Library☆332Updated last year
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆163Updated 2 years ago