eqv / hexslides
An opinionated tool to create amazing presentations
☆36Updated last year
Alternatives and similar repositories for hexslides:
Users that are interested in hexslides are comparing it to the libraries listed below
- Timeless debugging with symbolic execution and processor trace☆74Updated 3 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- print information from LLVM dataflow analyses☆13Updated 4 years ago
- Symbolic Execution over Falcon IL☆28Updated 3 years ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- ☆96Updated 5 years ago
- An approximate solver for concolic execution☆17Updated 2 years ago
- A monitoring script for AFL☆39Updated 7 years ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated last month
- Flex 'em lexers☆39Updated 4 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆59Updated 4 years ago
- ☆38Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- rune - radare2 based symbolic emulator☆26Updated 7 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- tool for multi-execution jump coverage introspection☆63Updated 2 months ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆65Updated 3 years ago
- Underconstrained symbolic execution for cryptography verification☆18Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 3 years ago
- ☆13Updated 3 years ago
- Dynamically discover the commands used to create a piece of software☆47Updated 2 months ago
- Recent Fuzzing Paper☆35Updated last year
- A framework for program analysis with a focus on modeling programmer assumptions, context- and path-sensitive analyses, and type checking…☆46Updated this week
- Target-centric program analysis.☆73Updated this week
- ☆63Updated 5 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆27Updated 7 years ago
- Fuzzing Parsers with Tokens☆32Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago