SymGDB - symbolic execution plugin for gdb
☆218May 15, 2018Updated 8 years ago
Alternatives and similar repositories for symgdb
Users that are interested in symgdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- Seeding fuzzers with symbolic execution☆202Oct 20, 2017Updated 8 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆496Aug 24, 2024Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆205Jul 22, 2020Updated 5 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Small tool for generating ropchains using unicorn and z3☆199Feb 22, 2018Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆207Mar 29, 2024Updated 2 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆284Jul 22, 2020Updated 5 years ago
- Differential fuzzing for the masses!☆154Aug 9, 2017Updated 8 years ago
- ☆252Mar 13, 2020Updated 6 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆327Aug 12, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,618Jun 11, 2025Updated 11 months ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 10 months ago
- jemalloc heap exploitation framework☆465Nov 29, 2021Updated 4 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions☆328Jan 4, 2024Updated 2 years ago
- Driller: augmenting AFL with symbolic execution!☆970Mar 24, 2025Updated last year
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- Path based Dynamic Analysis☆118Mar 25, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆388Oct 28, 2019Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆594Jan 10, 2019Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,167May 11, 2026Updated last week
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆96Feb 27, 2018Updated 8 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆897Nov 21, 2023Updated 2 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆319Jun 11, 2020Updated 5 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆653Jan 12, 2026Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- binary patching from Python☆638Jul 6, 2023Updated 2 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- ☆89May 9, 2019Updated 7 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆418Jun 6, 2018Updated 7 years ago
- Decompiler for x86 and x86-64 ELF binaries☆220Apr 16, 2019Updated 7 years ago