angr / archinfo
Classes with architecture-specific information useful to other projects.
☆90Updated last week
Alternatives and similar repositories for archinfo:
Users that are interested in archinfo are comparing it to the libraries listed below
- Utilities for generating dynamic traces☆91Updated 3 weeks ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- A patched version of VEX to work with PyVEX.☆107Updated last month
- Some helper scripts to set up an environment for angr development.☆117Updated 2 weeks ago
- ☆49Updated 4 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆81Updated 8 years ago
- A collection of extensions to angr to handle new platforms☆67Updated 3 weeks ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆215Updated 6 months ago
- ☆63Updated 5 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆207Updated 3 years ago
- Uncovering Class Hierarchies in C++ Programs☆126Updated 2 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- ELF Unstrip Tool☆106Updated 9 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- This repository contains the currently implemented angr concrete targets.☆33Updated last year
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆206Updated 2 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- A linux system call fuzzer using TriforceAFL☆175Updated last year
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆95Updated 4 months ago
- Dynamic security analysis of embedded systems’ firmwares☆81Updated 8 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆299Updated 2 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- IDA plugin for software complexity metrics assessment☆59Updated 7 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆123Updated last year
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆106Updated 6 years ago
- A PCode Emulator for Ghidra.☆108Updated 4 years ago