decompetition / disassemblerLinks
☆17Updated 5 years ago
Alternatives and similar repositories for disassembler
Users that are interested in disassembler are comparing it to the libraries listed below
Sorting:
- ☆49Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆64Updated 5 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Updated 4 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated 11 months ago
- Target-centric program analysis.☆77Updated 2 weeks ago
- haze binary fuzzer☆56Updated last year
- grap: define and match graph patterns within binaries☆156Updated 3 years ago
- Nampa - FLIRT for (binary) ninjas☆99Updated last year
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- A library for patching ELFs☆61Updated 5 years ago
- ☆41Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- Flex 'em lexers☆41Updated 5 years ago
- ☆72Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- Symbolic Simplification with PAttern Matching☆108Updated 8 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆127Updated last year
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆37Updated 5 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆135Updated 2 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Updated 8 years ago
- Load function names from an IDA Pro database inside GDB☆21Updated 7 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Updated 4 years ago
- A PCode Emulator for Ghidra.☆112Updated 4 years ago
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 3 years ago