Abstract library to generate angr states from a debugger state
☆61Jul 5, 2020Updated 5 years ago
Alternatives and similar repositories for angrdbg
Users that are interested in angrdbg are comparing it to the libraries listed below
Sorting:
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Jul 22, 2020Updated 5 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆282Jul 22, 2020Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆220Nov 17, 2020Updated 5 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- CRETE under development☆60Jun 30, 2020Updated 5 years ago
- IDA recompiler☆31Dec 8, 2014Updated 11 years ago
- A simple library focusing on demangling symbols for different programing languages☆48Dec 9, 2020Updated 5 years ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆61Jan 22, 2021Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆234Dec 29, 2020Updated 5 years ago
- integration with IDA☆94May 27, 2021Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Sep 23, 2022Updated 3 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆203Mar 14, 2019Updated 6 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆215Sep 17, 2021Updated 4 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- just my way of printing info☆16Feb 9, 2021Updated 5 years ago
- An implementation of the IETF QUIC protocol in F*☆20Aug 8, 2019Updated 6 years ago
- kAFL Fuzzer☆34Mar 12, 2025Updated 11 months ago
- angr源码分析☆33Jan 6, 2020Updated 6 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- frick - aka the first debugger built on top of frida☆295Dec 18, 2018Updated 7 years ago
- The new phuzzing framework!☆164Jun 14, 2024Updated last year
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆468Apr 10, 2023Updated 2 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- 3D Accelerated Exploitation☆54Feb 22, 2019Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- Program analysis tools developed at Draper on the CBAT project.☆106Apr 13, 2023Updated 2 years ago
- PoC for a taint based attack on VMProtect☆123Jul 3, 2019Updated 6 years ago
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Jul 21, 2024Updated last year
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago