angr / angr-docLinks
Documentation for the angr suite
☆845Updated 2 years ago
Alternatives and similar repositories for angr-doc
Users that are interested in angr-doc are comparing it to the libraries listed below
Sorting:
- Driller: augmenting AFL with symbolic execution!☆957Updated 8 months ago
- ☆1,076Updated last year
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆761Updated 3 years ago
- ☆735Updated 2 months ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆610Updated 2 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆651Updated 5 months ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,598Updated 5 months ago
- binary patching from Python☆638Updated 2 years ago
- Using Intel's PIN tool to solve CTF problems☆507Updated 5 years ago
- IDA FLIRT Signature Database☆888Updated 3 years ago
- AFL/QEMU fuzzing with full-system emulation.☆638Updated 7 years ago
- The 'exploitable' GDB plugin☆743Updated 3 years ago
- gdb for pwn☆958Updated 3 months ago
- lscan is a library identification tool on statically linked/stripped binaries☆405Updated 5 years ago
- Visualization of heap operations.☆615Updated 11 months ago
- Build a database of libc offsets to simplify exploitation☆1,840Updated last year
- Provide powerful tools for seccomp analysis☆1,083Updated last week
- Simplify format string exploitation.☆346Updated 4 years ago
- The official angr GUI.☆1,086Updated this week
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,063Updated 9 months ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆509Updated 4 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,836Updated 9 months ago
- Pintool example and PoC for dynamic binary analysis☆597Updated 3 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆832Updated last year
- For Linux binary Exploitation☆837Updated 7 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,275Updated 3 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆729Updated 7 months ago
- Linux Heap Exploitation Practice☆393Updated 7 years ago
- A Coverage Explorer for Reverse Engineers☆2,455Updated last year
- ☆1,366Updated 2 years ago