FSecureLABS / z3_and_angr_binary_analysis_workshopLinks
Code and exercises for a workshop on z3 and angr
☆228Updated 4 years ago
Alternatives and similar repositories for z3_and_angr_binary_analysis_workshop
Users that are interested in z3_and_angr_binary_analysis_workshop are comparing it to the libraries listed below
Sorting:
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆300Updated 2 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆153Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆216Updated 8 months ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago
- The new phuzzing framework!☆158Updated 11 months ago
- Binary code coverage visualizer plugin for Ghidra☆291Updated 11 months ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆188Updated last year
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆303Updated 9 months ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆208Updated 2 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆166Updated 2 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆141Updated 5 years ago
- Some helper scripts to set up an environment for angr development.☆117Updated this week
- ☆107Updated 6 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆278Updated 4 years ago
- ☆177Updated 3 months ago
- Ghidra Program Analysis Library☆335Updated last year
- Nampa - FLIRT for (binary) ninjas☆94Updated 5 months ago
- GlibC Malloc for Exploiters presentation☆147Updated 5 years ago
- Automatic ROPChain Generation☆287Updated 5 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆256Updated 2 months ago
- ☆198Updated 2 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆153Updated 4 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆386Updated last year