decompetition / challenges-2020Links
☆49Updated 3 years ago
Alternatives and similar repositories for challenges-2020
Users that are interested in challenges-2020 are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Updated 4 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆164Updated 3 years ago
- Ghidra Emulates Functions☆56Updated 5 years ago
- Target-centric program analysis.☆77Updated this week
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆205Updated this week
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆153Updated last year
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆90Updated 6 years ago
- ☆17Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated 10 months ago
- A PCode Emulator for Ghidra.☆111Updated 4 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆116Updated last year
- ☆73Updated last year
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆89Updated 6 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆195Updated last year
- This repository contains the currently implemented angr concrete targets.☆34Updated 2 years ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆133Updated 3 months ago
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated 10 months ago
- ☆154Updated 6 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- A collection of extensions to angr to handle new platforms☆69Updated 3 weeks ago
- Flex 'em lexers☆41Updated 5 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆139Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆99Updated 11 months ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- The Decompilation Wiki: info on all things decompilation☆226Updated 2 weeks ago
- Code and exercises for a workshop on z3 and angr☆233Updated 4 years ago
- ☆77Updated 3 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago