angr / angropLinks
☆681Updated 2 months ago
Alternatives and similar repositories for angrop
Users that are interested in angrop are comparing it to the libraries listed below
Sorting:
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆609Updated 2 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆751Updated 2 years ago
- Using Intel's PIN tool to solve CTF problems☆501Updated 5 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- Use angr in Ghidra☆585Updated 10 months ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- Driller: augmenting AFL with symbolic execution!☆941Updated 2 months ago
- Documentation for the angr suite☆843Updated 2 years ago
- ☆1,032Updated last year
- IDA FLIRT Signature Database☆871Updated 2 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆715Updated last month
- binary patching from Python☆637Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆681Updated 9 months ago
- The 'exploitable' GDB plugin☆733Updated 2 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,976Updated 3 months ago
- CLE Loads Everything (at least, many binary formats!)☆451Updated this week
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,549Updated last week
- AFL/QEMU fuzzing with full-system emulation.☆634Updated 6 years ago
- Visualization of heap operations.☆610Updated 6 months ago
- Detect, analyze and uniquely identify crashes in Windows applications☆507Updated 3 weeks ago
- The official angr GUI.☆1,002Updated this week
- A Miasm2 based function divination.☆537Updated 5 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆833Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆821Updated 5 years ago
- An abstraction layer for constraint solvers.☆313Updated this week
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆615Updated 6 months ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆256Updated 3 months ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆405Updated 2 years ago