Code Coverage Exploration Plugin for Ghidra
☆376Jul 19, 2024Updated last year
Alternatives and similar repositories for Cartographer
Users that are interested in Cartographer are comparing it to the libraries listed below
Sorting:
- ☆330Jun 20, 2024Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆740Sep 25, 2025Updated 5 months ago
- ☆187Nov 29, 2023Updated 2 years ago
- Binary Type Inference Ghidra Plugin☆168Feb 9, 2024Updated 2 years ago
- A reversing plugin for cross-decompiler collaboration, built on git.☆683Updated this week
- The FLARE team's open-source extension to add Python 3 scripting to Ghidra.☆776May 8, 2024Updated last year
- Quarkslab Bindiffer but not only !☆219May 5, 2025Updated 9 months ago
- ☆189Mar 21, 2025Updated 11 months ago
- Raw binary firmware analysis software☆569Jun 6, 2024Updated last year
- Binary code coverage visualizer plugin for Ghidra☆298Jun 27, 2024Updated last year
- Fuzzing Embedded Systems using Hardware Breakpoints☆191Nov 27, 2023Updated 2 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆133Jun 7, 2024Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆580Nov 5, 2025Updated 3 months ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆777Feb 18, 2026Updated last week
- A grammar-based custom mutator for AFL++☆271Dec 22, 2025Updated 2 months ago
- A Coverage Explorer for Reverse Engineers☆2,505Feb 14, 2026Updated 2 weeks ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- Fuzzware's main repository. Start here to install.☆363Dec 18, 2025Updated 2 months ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆21Sep 16, 2023Updated 2 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆289Jan 31, 2026Updated last month
- A lightweight dynamic instrumentation library☆1,308Apr 1, 2025Updated 11 months ago
- AArch64 fuzzer based on the Apple Silicon hypervisor☆196Nov 23, 2023Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Oct 28, 2021Updated 4 years ago
- Open-source symbolic execution framework: https://maat.re☆648Feb 22, 2026Updated last week
- A tool for firmware cartography☆165Dec 8, 2025Updated 2 months ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,293Jan 13, 2026Updated last month
- A decompiler-agnostic plugin for interacting with AI in your decompiler. GPT-4, Claude, and local models supported!☆684Jan 2, 2026Updated 2 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- revng: the core repository of the rev.ng project☆1,633Updated this week
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Feb 15, 2023Updated 3 years ago
- Lightweight fuzzing of a memory snapshot using KVM☆465Apr 11, 2024Updated last year
- Coverage-Guided Greybox Distributed Fuzzer☆133Jan 26, 2026Updated last month
- A collection of my weggli patterns to facilitate vulnerability research.☆155Jan 14, 2026Updated last month
- A collection of my Semgrep rules to facilitate vulnerability research.☆798Feb 17, 2026Updated 2 weeks ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆355Updated this week
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- ☆70Feb 28, 2025Updated last year