airbus-cyber / afl_ghidra_emu
☆185Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for afl_ghidra_emu
- ☆113Updated 2 years ago
- ☆131Updated 3 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆148Updated 10 months ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆156Updated 3 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- AFL binary instrumentation☆293Updated last year
- A PCode Emulator for Ghidra.☆105Updated 3 years ago
- Nampa - FLIRT for (binary) ninjas☆89Updated 2 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆180Updated 3 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆159Updated last year
- A de-socketing library for fuzzing.☆135Updated 2 months ago
- Code and exercises for a workshop on z3 and angr☆222Updated 3 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆145Updated 2 weeks ago
- Ghidra Emulates Functions☆53Updated 4 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆54Updated 6 months ago
- ☆189Updated last year
- A Framework for fuzzing USB Drivers by Device Emulation☆112Updated 3 years ago
- The new phuzzing framework!☆154Updated 5 months ago
- ☆71Updated 2 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆204Updated 3 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆164Updated 6 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- ☆115Updated last month
- Source code of HAL-fuzz☆141Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆182Updated 8 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆93Updated 10 months ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆119Updated last year
- FirmWire has replaced ShannonEE. OLD: A dynamic analysis environment for Samsung's Shannon baseband.☆37Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆98Updated 2 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 2 years ago