joernio / ghidra2cpgView external linksLinks
Code Property Graph (CPG) frontend for binary applications and libraries.
☆95Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for ghidra2cpg
Users that are interested in ghidra2cpg are comparing it to the libraries listed below
Sorting:
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- A data-flow-guided fuzzer☆124Aug 19, 2023Updated 2 years ago
- ☆188Mar 21, 2025Updated 10 months ago
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- ☆45Apr 12, 2022Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆75Oct 14, 2024Updated last year
- A suite of experiments for evaluating open-source binary taint trackers.☆32Feb 15, 2022Updated 3 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆547Feb 1, 2024Updated 2 years ago
- Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute …☆17May 22, 2024Updated last year
- LLVM meets Code Property Graphs☆96Feb 27, 2021Updated 4 years ago
- ☆238Jan 14, 2024Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated last month
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Oct 15, 2020Updated 5 years ago
- fuzzing + concolic = fuzzolic :)☆127Nov 6, 2025Updated 3 months ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Use angr in Ghidra☆617Jul 29, 2024Updated last year
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Jul 14, 2022Updated 3 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆66Dec 14, 2021Updated 4 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 6 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆267Feb 21, 2025Updated 11 months ago
- IDA plugin to pinpoint obfuscated code☆144Apr 29, 2022Updated 3 years ago
- A PCode Emulator for Ghidra.☆112Feb 7, 2021Updated 5 years ago
- Program analysis tools developed at Draper on the CBAT project.☆106Apr 13, 2023Updated 2 years ago
- Source code of MEUZZ fuzzer☆46Dec 11, 2021Updated 4 years ago
- Open-source symbolic execution framework: https://maat.re☆648Sep 4, 2025Updated 5 months ago
- CPython bytecode instrumentation and forkserver tools for fuzzing pure python and mixed python/c code using AFL☆31Apr 4, 2021Updated 4 years ago
- The Frida based fuzzer all in one☆30Mar 13, 2021Updated 4 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆370May 5, 2025Updated 9 months ago
- A binary analysis framework written in Rust.☆175Jun 25, 2025Updated 7 months ago
- Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM☆177May 19, 2025Updated 8 months ago
- A tool that automatically creates fuzzing harnesses based on a library☆284Nov 13, 2021Updated 4 years ago