Code and exercises for a workshop on z3 and angr
☆234Dec 29, 2020Updated 5 years ago
Alternatives and similar repositories for z3_and_angr_binary_analysis_workshop
Users that are interested in z3_and_angr_binary_analysis_workshop are comparing it to the libraries listed below
Sorting:
- ☆17Mar 29, 2021Updated 4 years ago
- Frida-based general purpose fuzzer☆221Aug 13, 2020Updated 5 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆387Sep 21, 2023Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆188Jul 28, 2022Updated 3 years ago
- Abstract library to generate angr states from a debugger state☆61Jul 5, 2020Updated 5 years ago
- Open-source symbolic execution framework: https://maat.re☆648Feb 22, 2026Updated last week
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- Workshop Material on VM-based Deobfuscation☆200Oct 20, 2021Updated 4 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Jul 22, 2020Updated 5 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Mar 26, 2022Updated 3 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆884Nov 21, 2023Updated 2 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,161Nov 14, 2020Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Jul 22, 2020Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆765Jul 25, 2022Updated 3 years ago
- Karta - source code assisted fast binary matching plugin for IDA☆901May 13, 2023Updated 2 years ago
- Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions☆322Jan 4, 2024Updated 2 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆323Dec 16, 2021Updated 4 years ago
- Using Intel's PIN tool to solve CTF problems☆507Apr 12, 2020Updated 5 years ago
- IDA Pro loader and processor modules for WebAssembly☆370Oct 4, 2018Updated 7 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- HexRays ctree visualization plugin☆437Sep 6, 2024Updated last year
- A Trace Explorer for Reverse Engineers☆1,520Oct 23, 2023Updated 2 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,070Dec 2, 2025Updated 2 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,846Feb 25, 2025Updated last year
- PoC for a taint based attack on VMProtect☆123Jul 3, 2019Updated 6 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆179Mar 29, 2022Updated 3 years ago
- A repository to store Z3-python scripts you can use as examples, reminders, whatever.☆281Aug 22, 2020Updated 5 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆135May 14, 2021Updated 4 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Use angr in Ghidra☆618Jul 29, 2024Updated last year
- Hexrays Toolbox - Find code patterns within the Hexrays ctree☆482Jun 20, 2023Updated 2 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆368May 5, 2025Updated 9 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- ☆239Jan 14, 2024Updated 2 years ago