L1NNA / jvdLinks
Disassembly Generation and Processing for JARV1S
☆16Updated 3 weeks ago
Alternatives and similar repositories for jvd
Users that are interested in jvd are comparing it to the libraries listed below
Sorting:
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆32Updated 5 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last week
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆25Updated 5 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- ☆21Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆17Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- ☆20Updated last month
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆70Updated 10 months ago
- ☆21Updated last year
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆17Updated 3 years ago
- ☆50Updated 3 weeks ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆91Updated 3 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Updated 5 years ago
- OSS-Fuzz Public Corpora Crawler☆26Updated 2 years ago
- A coverage-based software testing tool☆34Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆115Updated 5 months ago
- A tool to perform so called BGE attack☆25Updated 2 months ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Practical Data-Only Attack Generation☆40Updated last year