c3r34lk1ll3r / Instruction_Slicer
Binary Ninja plugin for forward/backward slicing
☆18Updated 4 years ago
Alternatives and similar repositories for Instruction_Slicer:
Users that are interested in Instruction_Slicer are comparing it to the libraries listed below
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- ☆24Updated last year
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆33Updated last year
- ☆28Updated last year
- Driver Security Analyzer☆51Updated 4 years ago
- AFLplusplus + libprotobuf-mutator = love☆84Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆29Updated 2 weeks ago
- Linux Kernel Snapshot Fuzzer using KVM☆46Updated last year
- ☆13Updated 3 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- nanoMIPS IDA plugin☆67Updated 3 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 2 months ago
- ☆14Updated 4 years ago
- ☆46Updated 3 years ago
- ☆34Updated 3 years ago
- Raw IDA Kernel API for IDAPython☆33Updated 3 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- Alternative API for IDA / Hex-Rays☆73Updated last year
- ☆36Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- ☆42Updated 3 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆65Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆15Updated 4 years ago
- Code snippets for Binary Ninja's Python API☆27Updated 3 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago