joeywang4 / Flexo
A compiler for microarchitectural weird machines
☆12Updated 7 months ago
Alternatives and similar repositories for Flexo:
Users that are interested in Flexo are comparing it to the libraries listed below
- 試試你的好手氣☆34Updated last year
- Cryfind is a tool to help you find crypto signatures in binary.☆34Updated 3 years ago
- ☆16Updated 9 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- ☆20Updated 8 months ago
- ☆29Updated 4 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- Python bindings for BochsCPU☆35Updated last month
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated last year
- QilingLab challenge writeup☆20Updated 3 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆39Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- Python interface for Binexport, the Bindiff export format☆14Updated last month
- Overview of Microsoft Patch Tuesday☆14Updated 6 months ago
- A framework provides an interface to monitor and control fuzzers☆31Updated last year
- IDA (sort of) headless☆24Updated last year
- Another (bad) ROP gadget finder, but this time in Rust☆20Updated 11 months ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆24Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- Go fastcall analysis for ida decompiler☆31Updated last month
- Dice CTF 2022 breach write-up☆15Updated 3 years ago
- Dark+ Theme☆48Updated 10 months ago
- ☆26Updated 3 years ago
- Here I store my proof of concepts☆14Updated 6 months ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆16Updated 10 months ago
- A tool to perform so called BGE attack☆24Updated 11 months ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆30Updated 4 years ago
- Rizin FLIRT Signature Database☆39Updated last year