ForAllSecure / bncov
Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization
☆128Updated 2 years ago
Alternatives and similar repositories for bncov:
Users that are interested in bncov are comparing it to the libraries listed below
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆207Updated 3 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆197Updated 2 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆123Updated last year
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆58Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago
- This repository contains the currently implemented angr concrete targets.☆33Updated last year
- Repo for various angr ipython features to give it more of a cli feeling☆55Updated 3 months ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆61Updated 4 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆93Updated last year
- Flex 'em lexers☆39Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 3 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- The new phuzzing framework!☆156Updated 10 months ago
- Utilities for generating dynamic traces☆91Updated 3 weeks ago
- A Low Level IL emulator for Binary Ninja☆37Updated 6 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆129Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆73Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 5 years ago
- ☆63Updated 5 years ago
- PEDA-like debugger UI for WinDbg☆203Updated last year
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Automatic Vulnerability Discovery☆37Updated 6 years ago
- Transfer analysis data between Binary Ninja and IDA☆130Updated 6 months ago