L1NNA / jvd
Disassembly Generation and Processing for JARV1S
☆14Updated 8 months ago
Alternatives and similar repositories for jvd:
Users that are interested in jvd are comparing it to the libraries listed below
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆25Updated 5 years ago
- ☆17Updated 4 years ago
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Updated 4 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated this week
- ☆9Updated 6 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated last year
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆19Updated 7 years ago
- Automate generation of syzkaller's grammar☆15Updated 2 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- python and honggfuzz☆25Updated 4 years ago
- A coverage-based software testing tool☆34Updated 4 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆12Updated last week
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- Code Property Graph (CPG) frontend for binary applications and libraries.☆88Updated 3 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Updated 4 years ago
- ☆24Updated 2 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆16Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 4 months ago