qiqi1 / taint_angrLinks
基于angr的污点分析引擎
☆41Updated 6 years ago
Alternatives and similar repositories for taint_angr
Users that are interested in taint_angr are comparing it to the libraries listed below
Sorting:
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆11Updated 7 months ago
- linux system call hook framework☆46Updated 6 years ago
- angr源码分析☆33Updated 5 years ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- A Coverage-Based fuzzing tools☆23Updated 4 years ago
- ☆15Updated 5 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- A solution for llvmvm in MRCTF2022☆11Updated 3 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 8 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 7 years ago
- ☆55Updated 3 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- some ida script☆34Updated 4 years ago
- CTF pwn工具,一个快速搭建任何版本环境的工具、使用chroot具备环境隔离、ida自动加载DWARF、被调试程序输入输出重定向等功能☆16Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- IoT Security Papers☆48Updated 5 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Updated 3 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 6 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位