angr / binaries
A repository with binaries for angr tests and examples.
☆59Updated this week
Alternatives and similar repositories for binaries:
Users that are interested in binaries are comparing it to the libraries listed below
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- ☆48Updated 4 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆99Updated 5 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- ☆53Updated 5 years ago
- ☆44Updated 7 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆99Updated 4 years ago
- BPF Processor for IDA Python☆51Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆101Updated 2 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆42Updated 4 years ago
- ROP Benchmark is a tool to compare ROP compilers☆41Updated 2 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 10 years ago
- ☆66Updated 5 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 10 months ago
- ☆41Updated 7 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- ☆44Updated 4 years ago
- ☆16Updated 7 years ago