kirasys / unicorn-fuzzerLinks
expansion of afl-unicorn using c++
☆28Updated 6 years ago
Alternatives and similar repositories for unicorn-fuzzer
Users that are interested in unicorn-fuzzer are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2017-0075☆37Updated 6 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- ☆35Updated 2 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Updated 13 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- reven2-scripts contains a set of REVEN scripts to automate timeless-analysis on REVEN traces.☆30Updated 3 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 6 years ago
- adobe afdko fuzz☆41Updated 6 years ago
- ☆31Updated 7 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 10 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- AllMemPro☆46Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- vm -- code interpreter☆25Updated 6 years ago
- ☆63Updated 8 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- Some writeups in ctf.☆11Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Updated 6 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- Tools released in CSS 2019☆38Updated 6 years ago
- by http://whereisk0shl.top/☆35Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- IDA 7.0 meets watch view!☆43Updated 4 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago