pietroborrello / RopMateLinks
ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.
☆26Updated 4 years ago
Alternatives and similar repositories for RopMate
Users that are interested in RopMate are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- ☆13Updated 4 years ago
- ☆53Updated 5 years ago
- Flex 'em lexers☆40Updated 4 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- ☆38Updated 4 years ago
- An approximate solver for concolic execution☆18Updated last month
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Updated 3 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 6 months ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Collection of DBI evasion techniques☆14Updated 3 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆26Updated 5 years ago
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- ☆15Updated 5 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 5 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- ☆17Updated 6 years ago
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago