pventuzelo / wasm_workshopLinks
"Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)
☆20Updated 4 years ago
Alternatives and similar repositories for wasm_workshop
Users that are interested in wasm_workshop are comparing it to the libraries listed below
Sorting:
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- gopclntab finder and analyzer for Radare2☆21Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- bash script and modified java program to headlessly use ghidra's decompiler☆57Updated 3 years ago
- ☆18Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆76Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Updated 3 years ago
- ☆14Updated 2 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A library for patching ELFs☆57Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆50Updated last year
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- tool for multi-execution jump coverage introspection☆66Updated 6 months ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆21Updated 5 years ago