This repository contains the currently implemented angr concrete targets.
☆34Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for angr-targets
Users that are interested in angr-targets are comparing it to the libraries listed below
Sorting:
- ☆12May 8, 2020Updated 5 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Target-centric program analysis.☆76Feb 9, 2026Updated last month
- AIL: The angr Intermediate Language.☆33May 28, 2025Updated 9 months ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Jul 22, 2020Updated 5 years ago
- ☆53Jun 23, 2025Updated 8 months ago
- ☆17Aug 31, 2023Updated 2 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆58Jan 15, 2025Updated last year
- Write-ups for CTF challenges.☆15May 30, 2021Updated 4 years ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- A collection of extensions to angr to handle new platforms☆69Nov 21, 2025Updated 3 months ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 8 months ago
- frozenkp's CTF Writeups & useful tools☆19Jun 29, 2020Updated 5 years ago
- 智慧財產權題目的解答資料庫☆14Dec 6, 2023Updated 2 years ago
- frozenkp's blog☆13Aug 25, 2023Updated 2 years ago
- A Low Level IL emulator for Binary Ninja☆41Feb 5, 2019Updated 7 years ago
- Capture The Flag for practice and contest☆17Dec 9, 2022Updated 3 years ago
- My RE challenge from Northsec 2018.☆14Jun 1, 2022Updated 3 years ago
- ☆17Sep 23, 2024Updated last year
- ☆21Nov 28, 2023Updated 2 years ago
- ☆18Sep 2, 2025Updated 6 months ago
- 领先的实践型网络安全在线学习平台☆18Feb 10, 2026Updated last month
- A (SLEIGH) disassembler that supports multiple architectures☆91Apr 30, 2022Updated 3 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Jan 19, 2022Updated 4 years ago
- ☆47Nov 15, 2021Updated 4 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- Prometheus-Decryptor is a project to decrypt files encrypted by Prometheus ransomware.☆53Aug 18, 2021Updated 4 years ago
- ☆810Feb 5, 2026Updated last month
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- ☆19Dec 28, 2021Updated 4 years ago
- Classes with architecture-specific information useful to other projects.☆95Updated this week
- ARM TrustZone Audit: Securing vs. Non-Securing Memory Separation☆23Mar 1, 2025Updated last year
- ☆50Dec 17, 2020Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆226Jul 2, 2025Updated 8 months ago