JannisKirschner / SymbolicExecutionDemystifiedLinks
Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022
☆100Updated 3 years ago
Alternatives and similar repositories for SymbolicExecutionDemystified
Users that are interested in SymbolicExecutionDemystified are comparing it to the libraries listed below
Sorting:
- Slides, recordings and materials of my public presentations, talks and workshops.☆79Updated 3 months ago
- ☆82Updated 2 years ago
- ☆50Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated 2 years ago
- binary ninja related code☆37Updated 6 months ago
- Xyntia, the black-box deobfuscator☆75Updated 3 months ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Multi-tool reverse engineering collaboration solution.☆140Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆65Updated 4 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆192Updated last year
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Updated 6 months ago
- Target components for kAFL/Nyx Fuzzer☆35Updated last year
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆152Updated last year
- Binary exploitation by confusing the unwinder☆65Updated 2 years ago
- ☆68Updated 7 months ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated 11 months ago
- A /proc/mem IDA loader to snapshot a running process☆164Updated 3 months ago
- ☆72Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆57Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Automatic ROPChain Generation☆292Updated 5 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- Static Binary Instrumentation☆122Updated 4 years ago
- ☆100Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆110Updated 2 years ago