angr / archrLinks
Target-centric program analysis.
☆76Updated this week
Alternatives and similar repositories for archr
Users that are interested in archr are comparing it to the libraries listed below
Sorting:
- Flex 'em lexers☆40Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 5 months ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆93Updated last year
- The new phuzzing framework!☆159Updated last year
- This repository contains the currently implemented angr concrete targets.☆34Updated last year
- A collection of extensions to angr to handle new platforms☆67Updated 2 months ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- ☆131Updated 5 years ago
- Utilities for generating dynamic traces☆92Updated 2 months ago
- tool for multi-execution jump coverage introspection☆65Updated 4 months ago
- ☆96Updated 6 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆166Updated 2 years ago
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆61Updated 4 years ago
- Recent Fuzzing Paper☆35Updated last year
- ☆63Updated 6 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 6 months ago
- ☆84Updated 2 months ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆83Updated this week
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆75Updated 4 years ago
- ☆15Updated 5 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago