angr / unicornLinks
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
☆14Updated 6 years ago
Alternatives and similar repositories for unicorn
Users that are interested in unicorn are comparing it to the libraries listed below
Sorting:
- A repository with binaries for angr tests and examples.☆63Updated this week
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Updated 5 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- Utilities for generating dynamic traces☆94Updated 10 months ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Updated 6 years ago
- Futile attempt to solve the Tigress challenges using angr☆23Updated 6 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- BPF Processor for IDA Python☆53Updated 7 years ago
- Use Intel Pin tools to analysis binary.☆38Updated 10 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- ☆87Updated 10 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 10 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- ☆53Updated 6 years ago
- ☆31Updated 5 years ago
- Repository for understanding and writing LLVM passes.☆34Updated 6 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆60Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 6 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆71Updated 5 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Updated last year
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- integration with IDA☆94Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 4 years ago
- First level taint implementation with qemu for linux user mode☆28Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated last year