gast04 / r4geLinks
Symbolic Execution Tool in r2
☆106Updated 3 years ago
Alternatives and similar repositories for r4ge
Users that are interested in r4ge are comparing it to the libraries listed below
Sorting:
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- r2con 2017 September 6-9☆97Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- ☆49Updated 7 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆52Updated 8 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- ☆81Updated 8 years ago
- Automated fuzzing framework☆120Updated 2 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆143Updated 4 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- IDA cLEMENCy Tools☆63Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆159Updated 7 years ago
- ☆50Updated 5 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆189Updated 4 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated last month
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 6 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 6 years ago
- ☆125Updated 4 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 9 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- SymGDB - symbolic execution plugin for gdb☆218Updated 7 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Updated 9 years ago