GJDuck / e9patchLinks
A powerful static binary rewriting tool
☆1,038Updated 3 months ago
Alternatives and similar repositories for e9patch
Users that are interested in e9patch are comparing it to the libraries listed below
Sorting:
- A lightweight dynamic instrumentation library☆1,267Updated 4 months ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆720Updated 3 months ago
- SymCC: efficient compiler-based symbolic execution☆825Updated 2 months ago
- A fast and accurate disassembler☆711Updated 2 weeks ago
- A fuzzer for full VM kernel/driver targets☆728Updated 3 weeks ago
- Library for lifting machine code to LLVM bitcode☆1,436Updated last week
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆480Updated 7 months ago
- DyninstAPI: Tools for binary instrumentation, analysis, and modification.☆793Updated this week
- revng: the core repository of the rev.ng project☆1,507Updated this week
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆572Updated 3 months ago
- llvm-mctoll☆854Updated last year
- The fastest Intel-PT decoder for fuzzing☆373Updated last year
- Rellic produces goto-free C output from LLVM bitcode☆573Updated 2 months ago
- Winnie makes fuzzing Windows applications easy☆562Updated 2 years ago
- CLE Loads Everything (at least, many binary formats!)☆455Updated this week
- The official angr GUI.☆1,029Updated this week
- Intermediate Representation for Binary analysis and transformation☆341Updated 3 weeks ago
- Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic e…☆946Updated 3 years ago
- anvill forges beautiful LLVM bitcode out of raw machine code☆352Updated 10 months ago
- cwe_checker finds vulnerable patterns in binary executables☆1,241Updated 3 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,817Updated 5 months ago
- Use angr in Ghidra☆598Updated last year
- SymQEMU: Compilation-based symbolic execution for binaries☆351Updated 2 months ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆615Updated 7 months ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,236Updated 4 months ago
- Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode☆2,708Updated 3 years ago
- Automated static analysis tools for binary programs☆1,621Updated 3 weeks ago
- Python snippets for Ghidra's Program and Decompiler APIs☆819Updated 2 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆444Updated last year
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Updated last year