angr / angr-platforms
A collection of extensions to angr to handle new platforms
☆66Updated 3 months ago
Alternatives and similar repositories for angr-platforms:
Users that are interested in angr-platforms are comparing it to the libraries listed below
- Utilities for generating dynamic traces☆88Updated 2 years ago
- Flex 'em lexers☆39Updated 4 years ago
- Some helper scripts to set up an environment for angr development.☆117Updated 3 months ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- Classes with architecture-specific information useful to other projects.☆89Updated this week
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 3 years ago
- ☆52Updated 5 years ago
- This repository contains the currently implemented angr concrete targets.☆32Updated last year
- Ghidra Emulates Functions☆54Updated 4 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆83Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 8 months ago
- A patched version of VEX to work with PyVEX.☆105Updated last month
- A PCode Emulator for Ghidra.☆106Updated 3 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆111Updated 6 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- ☆47Updated 4 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆94Updated last month
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- Block Oriented Programming -- Compiler☆182Updated 4 years ago
- Source code of HAL-fuzz☆143Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆99Updated 5 years ago
- ☆38Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆136Updated 3 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Symbolic Execution Over Processor Traces☆118Updated 5 months ago
- ☆96Updated 5 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆206Updated 3 years ago