SymGDB - symbolic execution plugin for gdb
☆218May 15, 2018Updated 7 years ago
Alternatives and similar repositories for symgdb
Users that are interested in symgdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- Seeding fuzzers with symbolic execution☆202Oct 20, 2017Updated 8 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆204Jul 22, 2020Updated 5 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆207Mar 29, 2024Updated 2 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Jul 22, 2020Updated 5 years ago
- Differential fuzzing for the masses!☆155Aug 9, 2017Updated 8 years ago
- ☆252Mar 13, 2020Updated 6 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆325Aug 12, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,618Jun 11, 2025Updated 10 months ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 9 months ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions☆324Jan 4, 2024Updated 2 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Driller: augmenting AFL with symbolic execution!☆968Mar 24, 2025Updated last year
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- Path based Dynamic Analysis☆118Mar 25, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆388Oct 28, 2019Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆594Jan 10, 2019Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,145Apr 15, 2026Updated 2 weeks ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆895Nov 21, 2023Updated 2 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆319Jun 11, 2020Updated 5 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆652Jan 12, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- ☆89May 9, 2019Updated 6 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆418Jun 6, 2018Updated 7 years ago
- Decompiler for x86 and x86-64 ELF binaries☆220Apr 16, 2019Updated 7 years ago