GJDuck / e9patchLinks
A powerful static binary rewriting tool
☆1,047Updated 4 months ago
Alternatives and similar repositories for e9patch
Users that are interested in e9patch are comparing it to the libraries listed below
Sorting:
- A fast and accurate disassembler☆713Updated last month
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆723Updated 3 months ago
- A lightweight dynamic instrumentation library☆1,271Updated 4 months ago
- SymCC: efficient compiler-based symbolic execution☆832Updated 3 months ago
- Library for lifting machine code to LLVM bitcode☆1,443Updated this week
- A fuzzer for full VM kernel/driver targets☆733Updated last month
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆482Updated 8 months ago
- DyninstAPI: Tools for binary instrumentation, analysis, and modification.☆797Updated this week
- revng: the core repository of the rev.ng project☆1,529Updated 2 weeks ago
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆577Updated 4 months ago
- The fastest Intel-PT decoder for fuzzing☆374Updated last year
- llvm-mctoll☆856Updated last year
- Rellic produces goto-free C output from LLVM bitcode☆573Updated 3 months ago
- CLE Loads Everything (at least, many binary formats!)☆457Updated last week
- Intermediate Representation for Binary analysis and transformation☆341Updated last month
- The official angr GUI.☆1,037Updated this week
- anvill forges beautiful LLVM bitcode out of raw machine code☆352Updated 11 months ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆615Updated 8 months ago
- Winnie makes fuzzing Windows applications easy☆562Updated 2 years ago
- Automated static analysis tools for binary programs☆1,622Updated last month
- SymQEMU: Compilation-based symbolic execution for binaries☆355Updated 3 months ago
- Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode☆2,713Updated 3 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,820Updated 5 months ago
- Driller: augmenting AFL with symbolic execution!☆948Updated 4 months ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆450Updated last year
- Use angr in Ghidra☆604Updated last year
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆948Updated 3 years ago
- Python snippets for Ghidra's Program and Decompiler APIs☆829Updated 2 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,239Updated 4 months ago
- cwe_checker finds vulnerable patterns in binary executables☆1,244Updated 4 months ago