pventuzelo / wasm_workshopLinks
"Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)
☆22Updated 5 years ago
Alternatives and similar repositories for wasm_workshop
Users that are interested in wasm_workshop are comparing it to the libraries listed below
Sorting:
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- gopclntab finder and analyzer for Radare2☆21Updated 5 years ago
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- ☆19Updated 3 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- A library for patching ELFs☆57Updated 4 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- ☆14Updated 2 years ago
- ☆76Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago
- tool for multi-execution jump coverage introspection☆67Updated 10 months ago
- Binary-only fuzzer for WebAssembly (WASI)☆51Updated last year
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- ☆21Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated 2 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆74Updated 7 years ago
- ☆50Updated 3 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago