decompetition / challenges-2020Links
☆48Updated 3 years ago
Alternatives and similar repositories for challenges-2020
Users that are interested in challenges-2020 are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated 9 months ago
- Ghidra Emulates Functions☆55Updated 5 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆164Updated 2 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆63Updated 4 years ago
- ☆17Updated 4 years ago
- Target-centric program analysis.☆77Updated 2 weeks ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆89Updated 6 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆194Updated last year
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Updated 3 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆140Updated 4 years ago
- A fuzzing introspection tool☆167Updated 5 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆76Updated 5 years ago
- ☆154Updated 6 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆156Updated 4 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆133Updated 2 years ago
- A collection of extensions to angr to handle new platforms☆68Updated 7 months ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆90Updated 6 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆203Updated this week
- Code and exercises for a workshop on z3 and angr☆231Updated 4 years ago
- Source code of HAL-fuzz☆154Updated 4 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆63Updated 5 years ago
- Flex 'em lexers☆41Updated 5 years ago
- pwntools library implementation in c++☆48Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆226Updated 5 years ago
- Build your emulation environment as needed☆66Updated 4 years ago