ROPilicious / srcLinks
This is the source of our Return Oriented Programming tool.
☆14Updated 6 years ago
Alternatives and similar repositories for src
Users that are interested in src are comparing it to the libraries listed below
Sorting:
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- expansion of afl-unicorn using c++☆28Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ROP database plugin for IDA☆32Updated 7 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Ditto.☆18Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 7 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- ☆31Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆35Updated 5 years ago
- ☆35Updated 2 years ago
- ARG: Automatic ROP chains Generation☆22Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- ☆54Updated 6 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Java Library wrapper for Ghidra Headless Analysis + Java Samples☆21Updated 3 years ago
- ☆19Updated 3 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago