SymGDB - symbolic execution plugin for gdb
☆218May 15, 2018Updated 7 years ago
Alternatives and similar repositories for symgdb
Users that are interested in symgdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆204Jul 22, 2020Updated 5 years ago
- Triton based R2 plugin for concolic execution and total control☆34Nov 26, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated 2 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆283Jul 22, 2020Updated 5 years ago
- Differential fuzzing for the masses!☆155Aug 9, 2017Updated 8 years ago
- ☆252Mar 13, 2020Updated 6 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆325Aug 12, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,619Jun 11, 2025Updated 9 months ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 9 months ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions☆323Jan 4, 2024Updated 2 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Driller: augmenting AFL with symbolic execution!☆969Mar 24, 2025Updated last year
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- Path based Dynamic Analysis☆118Mar 25, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆388Oct 28, 2019Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆592Jan 10, 2019Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,125Mar 8, 2026Updated last month
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 8 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆889Nov 21, 2023Updated 2 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆317Jun 11, 2020Updated 5 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆652Jan 12, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- ☆89May 9, 2019Updated 6 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Jun 6, 2018Updated 7 years ago
- Decompiler for x86 and x86-64 ELF binaries☆220Apr 16, 2019Updated 6 years ago