airbus-cyber / afl_ghidra_emu
☆186Updated 3 years ago
Alternatives and similar repositories for afl_ghidra_emu:
Users that are interested in afl_ghidra_emu are comparing it to the libraries listed below
- ☆196Updated 2 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆181Updated 3 years ago
- ☆132Updated 4 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆151Updated last year
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆206Updated 3 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆55Updated 2 months ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆296Updated 2 years ago
- ☆130Updated 3 years ago
- A PCode Emulator for Ghidra.☆108Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 3 months ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆114Updated 3 months ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆183Updated last year
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆160Updated 3 years ago
- AFL binary instrumentation☆296Updated 2 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Source code of HAL-fuzz☆146Updated 4 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆122Updated 3 months ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- Snapshot fuzzing with KVM and LibAFL☆94Updated 2 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆122Updated last year
- Code and exercises for a workshop on z3 and angr☆226Updated 4 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆163Updated 2 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆163Updated 10 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆101Updated last year
- A de-socketing library for fuzzing.☆141Updated last week
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆83Updated 2 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆137Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆116Updated 7 years ago