L1NNA / jvd
Disassembly Generation and Processing for JARV1S
☆13Updated 6 months ago
Alternatives and similar repositories for jvd:
Users that are interested in jvd are comparing it to the libraries listed below
- Default query sets for Joern☆26Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆26Updated last week
- ☆22Updated 4 years ago
- ☆9Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆25Updated 5 years ago
- A coverage-based software testing tool☆33Updated 4 years ago
- First level taint implementation with qemu for linux user mode☆26Updated 4 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Updated 5 years ago
- gopclntab finder and analyzer for Radare2☆19Updated 4 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆86Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- FunSeeker: Binary Function Identification Tool☆24Updated last year
- Files used for reproducing Fuzzware's experiments☆55Updated last year
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 3 years ago
- A monitoring script for AFL☆39Updated 8 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆15Updated 4 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Updated 3 years ago
- Ditto.☆17Updated 4 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆29Updated 4 years ago