angr / pyvex
Python bindings for Valgrind's VEX IR.
☆342Updated this week
Related projects ⓘ
Alternatives and complementary repositories for pyvex
- CLE Loads Everything (at least, many binary formats!)☆417Updated this week
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆278Updated 5 years ago
- A patched version of VEX to work with PyVEX.☆105Updated 2 months ago
- An abstraction layer for constraint solvers.☆294Updated this week
- Some helper scripts to set up an environment for angr development.☆117Updated last month
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆450Updated 3 weeks ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆573Updated 5 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆252Updated 4 months ago
- Improving AFL by using Intel PT to collect branch information☆289Updated 5 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆596Updated last year
- SymQEMU: Compilation-based symbolic execution for binaries☆333Updated 2 weeks ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆176Updated 2 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆186Updated 3 years ago
- Bucket and triage on-disk crashes. OSX and Linux.☆349Updated last month
- A taint-tracking plugin for the Valgrind memory checking tool☆250Updated last year
- Fuzzer for Linux Kernel Drivers☆371Updated 2 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆238Updated 2 years ago
- ☆379Updated 5 years ago
- LAVA: Large-scale Automated Vulnerability Addition☆371Updated 3 weeks ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆325Updated 5 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆340Updated 3 months ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆202Updated 3 years ago
- ☆373Updated 3 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆631Updated 2 years ago
- The Jakstab static analysis platform for binaries☆157Updated 4 years ago
- Intermediate Representation for Binary analysis and transformation☆310Updated 2 months ago
- The fastest Intel-PT decoder for fuzzing☆360Updated 9 months ago
- A Miasm2 based function divination.☆531Updated 4 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆680Updated 6 months ago