L1NNA / jvd
Disassembly Generation and Processing for JARV1S
☆13Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for jvd
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆67Updated 2 months ago
- A coverage-based software testing tool☆29Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- IoT Malware Similarity Analysis Platform☆44Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated last year
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- A tool to perform so called BGE attack☆22Updated 7 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆25Updated this week
- AIL: The angr Intermediate Language.☆31Updated this week
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆34Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆14Updated 2 years ago
- Default query sets for Joern☆25Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- ☆23Updated 2 years ago
- gopclntab finder and analyzer for Radare2☆19Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆83Updated 3 years ago
- MIPS32 emulation fuzzing☆11Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Very Simple Fuzzer☆20Updated 4 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆11Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆26Updated 2 years ago
- tool for multi-execution jump coverage introspection☆63Updated last week
- Files used for reproducing Fuzzware's experiments☆54Updated last year
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆51Updated 5 years ago