MartialB / BinSlayerLinks
☆36Updated 12 years ago
Alternatives and similar repositories for BinSlayer
Users that are interested in BinSlayer are comparing it to the libraries listed below
Sorting:
- Z3 Symbolic Execution python☆28Updated 8 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Updated 13 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆52Updated this week
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 8 years ago
- ☆28Updated 3 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- IDA plugin for software complexity metrics assessment☆60Updated 8 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 12 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 5 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- Python concolic execution framework for program analysis☆68Updated 11 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Updated 10 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆64Updated 10 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 9 years ago
- Mozilla fork of the American Fuzzy Lop repo☆47Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Dynamic security analysis of embedded systems’ firmwares☆83Updated 9 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Updated 12 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 10 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 8 years ago
- A pip wrapper around AFL.☆87Updated 4 years ago
- ☆49Updated 3 years ago