ROPilicious / srcLinks
This is the source of our Return Oriented Programming tool.
☆14Updated 6 years ago
Alternatives and similar repositories for src
Users that are interested in src are comparing it to the libraries listed below
Sorting:
- expansion of afl-unicorn using c++☆28Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 6 years ago
- ROP database plugin for IDA☆32Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago
- ☆31Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Updated 5 years ago
- Ditto.☆18Updated 5 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Assorted pintools☆30Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Dynamic Control Flow Recovery☆25Updated 7 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- ☆37Updated 3 years ago
- ☆19Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆48Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 9 years ago
- x86 Dynamic Binary Translator Library☆34Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 5 years ago
- ☆53Updated 6 years ago
- View Linux perf traces in IDA Pro☆15Updated 6 years ago
- ARG: Automatic ROP chains Generation☆21Updated 6 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago