angr / pyvexLinks
Python bindings for Valgrind's VEX IR.
☆365Updated this week
Alternatives and similar repositories for pyvex
Users that are interested in pyvex are comparing it to the libraries listed below
Sorting:
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆292Updated 6 years ago
- An abstraction layer for constraint solvers.☆316Updated last week
- CLE Loads Everything (at least, many binary formats!)☆462Updated last week
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆261Updated 3 weeks ago
- A patched version of VEX to work with PyVEX.☆112Updated last week
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆609Updated 2 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆261Updated 3 months ago
- Some helper scripts to set up an environment for angr development.☆118Updated last month
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆345Updated last year
- The Jakstab static analysis platform for binaries☆160Updated 5 years ago
- Intermediate Representation for Binary analysis and transformation☆344Updated 2 months ago
- Improving AFL by using Intel PT to collect branch information☆292Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆582Updated 6 years ago
- LAVA: Large-scale Automated Vulnerability Addition☆405Updated 2 months ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 4 years ago
- ☆384Updated 5 years ago
- ☆253Updated 5 years ago
- ☆390Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆200Updated 5 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- Fuzzer for Linux Kernel Drivers☆384Updated 3 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆355Updated 4 months ago
- A Miasm2 based function divination.☆539Updated 5 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆725Updated 4 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆260Updated 6 months ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- The fastest Intel-PT decoder for fuzzing☆374Updated last year
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆486Updated 2 weeks ago
- Classes with architecture-specific information useful to other projects.☆95Updated last week
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆341Updated 6 years ago