fkie-cad / cwe_checkerLinks
cwe_checker finds vulnerable patterns in binary executables
☆1,223Updated last month
Alternatives and similar repositories for cwe_checker
Users that are interested in cwe_checker are comparing it to the libraries listed below
Sorting:
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,972Updated 3 months ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,800Updated 3 months ago
- The official angr GUI.☆995Updated this week
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,259Updated 2 years ago
- EMUX Firmware Emulation Framework (formerly ARMX)☆746Updated 2 weeks ago
- Provide powerful tools for seccomp analysis☆1,038Updated this week
- ☆676Updated 2 months ago
- ☆1,028Updated last year
- Documentation for the angr suite☆843Updated 2 years ago
- A Coverage Explorer for Reverse Engineers☆2,364Updated 10 months ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,209Updated 2 months ago
- Driller: augmenting AFL with symbolic execution!☆937Updated 2 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,942Updated 2 weeks ago
- Use angr in Ghidra☆584Updated 10 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆694Updated 7 months ago
- AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)☆927Updated this week
- Automated static analysis tools for binary programs☆1,602Updated 2 weeks ago
- A lightweight dynamic instrumentation library☆1,253Updated 2 months ago
- Some helpful preload libraries for pwning stuff.☆1,613Updated last week
- A powerful static binary rewriting tool☆1,013Updated last month
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,617Updated 11 months ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆410Updated 3 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,129Updated last year
- The 'exploitable' GDB plugin☆731Updated 2 years ago
- A fork and successor of the Sulley Fuzzing Framework☆2,162Updated last week
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,435Updated 8 months ago
- the Network Protocol Fuzzer that we will want to use.☆758Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆680Updated 8 months ago
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆3,742Updated last week
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆711Updated last month