L1NNA / jvdLinks
Disassembly Generation and Processing for JARV1S
☆15Updated 5 months ago
Alternatives and similar repositories for jvd
Users that are interested in jvd are comparing it to the libraries listed below
Sorting:
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- ☆65Updated 5 months ago
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆13Updated 2 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 4 years ago
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- First level taint implementation with qemu for linux user mode☆28Updated 5 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 3 weeks ago
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆54Updated 2 years ago
- Binary Reverse Engineering Data Science Kit☆87Updated 5 years ago
- gopclntab finder and analyzer for Radare2☆21Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Diaphora Machine Learning tools and datasets☆23Updated last year
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 4 years ago
- Python interface for Binexport, the Bindiff export format☆19Updated 3 weeks ago
- OSS-Fuzz Public Corpora Crawler☆26Updated 2 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 9 months ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 4 years ago
- tool for multi-execution jump coverage introspection☆68Updated 11 months ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Updated 4 years ago
- Ghidra RE scripts☆38Updated 4 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- ☆76Updated 4 years ago
- ☆12Updated last month
- ☆14Updated 3 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 4 years ago
- ☆21Updated 2 years ago