Code and exercises for a workshop on z3 and angr
☆235Dec 29, 2020Updated 5 years ago
Alternatives and similar repositories for z3_and_angr_binary_analysis_workshop
Users that are interested in z3_and_angr_binary_analysis_workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Mar 29, 2021Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆62Jul 5, 2020Updated 5 years ago
- Frida-based general purpose fuzzer☆220Aug 13, 2020Updated 5 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆187Jul 28, 2022Updated 3 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆391Sep 21, 2023Updated 2 years ago
- A repository to store Z3-python scripts you can use as examples, reminders, whatever.☆282Aug 22, 2020Updated 5 years ago
- Open-source symbolic execution framework: https://maat.re☆649Feb 22, 2026Updated 2 months ago
- Workshop Material on VM-based Deobfuscation☆204Oct 20, 2021Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆205Jul 22, 2020Updated 5 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆284Jul 22, 2020Updated 5 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Mar 26, 2022Updated 4 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆897Nov 21, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,167May 11, 2026Updated last week
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,166Nov 14, 2020Updated 5 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆134May 14, 2021Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆772Jul 25, 2022Updated 3 years ago
- A Trace Explorer for Reverse Engineers☆1,538Oct 23, 2023Updated 2 years ago
- IDA Pro loader and processor modules for WebAssembly☆372Oct 4, 2018Updated 7 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆58Jan 15, 2025Updated last year
- PoC for a taint based attack on VMProtect☆125Jul 3, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆324Dec 16, 2021Updated 4 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆439Aug 22, 2018Updated 7 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,618Jun 11, 2025Updated 11 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,853Feb 25, 2025Updated last year
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions☆328Jan 4, 2024Updated 2 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆525Jun 28, 2024Updated last year
- ☆1,119Mar 14, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆300Mar 15, 2019Updated 7 years ago
- Using Intel's PIN tool to solve CTF problems☆505Apr 12, 2020Updated 6 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 3 years ago
- The new phuzzing framework!☆164Jun 14, 2024Updated last year
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆375May 5, 2025Updated last year
- Driller: augmenting AFL with symbolic execution!☆970Mar 24, 2025Updated last year