decompetition / disassemblerLinks
☆17Updated 5 years ago
Alternatives and similar repositories for disassembler
Users that are interested in disassembler are comparing it to the libraries listed below
Sorting:
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- haze binary fuzzer☆56Updated last year
- ☆49Updated 3 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆64Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Updated last year
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- ☆50Updated 3 years ago
- A library for patching ELFs☆62Updated 5 years ago
- ☆185Updated 3 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Updated 4 years ago
- ☆154Updated 7 years ago
- Cross-architecture instruction counting for CTF solving☆48Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- A fast execution trace symbolizer for Windows.☆130Updated last year
- Nampa - FLIRT for (binary) ninjas☆99Updated last year
- grap: define and match graph patterns within binaries☆156Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆198Updated last year
- Symbolic Simplification with PAttern Matching☆108Updated 8 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Updated 2 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated last year
- Build your emulation environment as needed☆66Updated 4 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Updated 8 years ago
- Load function names from an IDA Pro database inside GDB☆21Updated 7 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Updated 4 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- ☆86Updated 2 years ago