angr / pyvexLinks
Python bindings for Valgrind's VEX IR.
☆358Updated last week
Alternatives and similar repositories for pyvex
Users that are interested in pyvex are comparing it to the libraries listed below
Sorting:
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆285Updated 6 years ago
- CLE Loads Everything (at least, many binary formats!)☆449Updated last week
- A patched version of VEX to work with PyVEX.☆109Updated 3 months ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆256Updated 2 months ago
- An abstraction layer for constraint solvers.☆313Updated last week
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆580Updated 6 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆608Updated last year
- Some helper scripts to set up an environment for angr development.☆117Updated this week
- A Miasm2 based function divination.☆536Updated 4 years ago
- The Jakstab static analysis platform for binaries☆158Updated 5 years ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆386Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Fuzzer for Linux Kernel Drivers☆378Updated 3 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆346Updated 3 weeks ago
- Improving AFL by using Intel PT to collect branch information☆292Updated 5 years ago
- Driller: augmenting AFL with symbolic execution!☆937Updated 2 months ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆278Updated 4 years ago
- ☆384Updated 5 years ago
- Intermediate Representation for Binary analysis and transformation☆336Updated 3 weeks ago
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆475Updated 5 months ago
- ☆144Updated 7 months ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆345Updated 10 months ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆259Updated this week
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 4 years ago
- Ghidra Program Analysis Library☆335Updated last year
- ☆235Updated 7 years ago
- AFLFast (extends AFL with Power Schedules)☆417Updated last year
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆257Updated 3 months ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆711Updated last month