angr / angr-targets
This repository contains the currently implemented angr concrete targets.
☆33Updated last year
Alternatives and similar repositories for angr-targets:
Users that are interested in angr-targets are comparing it to the libraries listed below
- Build your emulation environment as needed☆65Updated 3 years ago
- Flex 'em lexers☆39Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 2 months ago
- ☆47Updated 4 years ago
- Target-centric program analysis.☆73Updated this week
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- A Low Level IL emulator for Binary Ninja☆37Updated 6 years ago
- ☆53Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated last month
- Kernel driver to fuzz Hyper-V hypercalls☆136Updated 6 years ago
- A collection of extensions to angr to handle new platforms☆67Updated 3 weeks ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆121Updated 11 months ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆81Updated 3 weeks ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆136Updated 3 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- WCTF 2019 challenge☆99Updated 5 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago
- Utilities for generating dynamic traces☆90Updated 2 years ago
- A fast execution trace symbolizer for Windows.☆130Updated 9 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆100Updated 2 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 4 years ago