Vasco-jofra / format-string-finder-binjaLinks
A binary ninja plugin that finds format string vulnerabilities
☆25Updated 5 years ago
Alternatives and similar repositories for format-string-finder-binja
Users that are interested in format-string-finder-binja are comparing it to the libraries listed below
Sorting:
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated last month
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆99Updated last year
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆134Updated 2 years ago
- A library for patching ELFs☆60Updated 5 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 3 years ago
- tool for multi-execution jump coverage introspection☆68Updated 10 months ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Library to wrap all file calls when fuzzing with AFL++☆51Updated 2 years ago
- ☆70Updated 9 months ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- ☆188Updated 9 months ago
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- Function signature matching and signature generation plugin for Binary Ninja☆77Updated last month
- Transfer analysis data between Binary Ninja and IDA☆135Updated 2 months ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆94Updated 2 years ago
- Use Ghidra Structs in Python☆30Updated 4 years ago
- Binary Ninja Syscall Annotator☆46Updated 3 years ago
- ☆50Updated 3 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated 11 months ago
- This project tries to provide additional Ghidra Version Tracking Correlators suitable for patch diffing.☆92Updated 2 years ago
- ☆136Updated 4 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆127Updated last year
- About as basic of a mutator as you can get, but it does the trick in most situations☆64Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- ☆26Updated 7 years ago