qiqi1 / taint_angrView external linksLinks
基于angr的污点分析引擎
☆41Apr 19, 2019Updated 6 years ago
Alternatives and similar repositories for taint_angr
Users that are interested in taint_angr are comparing it to the libraries listed below
Sorting:
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Using automata learning to mine models used for fuzzing of statefull systems☆24Apr 13, 2021Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- A binary to LLVM translator☆151Jun 5, 2018Updated 7 years ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Jul 7, 2022Updated 3 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Mar 30, 2020Updated 5 years ago
- Trace Log Generation (CLI) on a target device or emulator : Generating context information of every instruction from a specific point (in…☆22Jan 16, 2017Updated 9 years ago
- ☆17May 30, 2020Updated 5 years ago
- vm -- code interpreter☆25Apr 8, 2019Updated 6 years ago
- ☆238Jan 14, 2024Updated 2 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆174Jan 29, 2026Updated 2 weeks ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Android runtime jit binary file parser☆13Dec 20, 2017Updated 8 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- ☆53Nov 26, 2017Updated 8 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆231Jun 9, 2020Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Apr 21, 2019Updated 6 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆27Dec 17, 2019Updated 6 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆43Jan 18, 2024Updated 2 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- A fork of AFL for fuzzing Windows binaries☆53Dec 31, 2018Updated 7 years ago
- ☆37May 11, 2022Updated 3 years ago
- Fuzzing JavaScript WebAssembly APIs using Dharma/Domato (Chrome/v8, etc.)☆43Feb 8, 2022Updated 4 years ago
- ☆41Nov 20, 2017Updated 8 years ago
- A framework for static analysis of ROP exploits and programs☆40May 13, 2019Updated 6 years ago
- A dynamic analysis platform for Android☆44Jul 9, 2019Updated 6 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆89Sep 18, 2025Updated 4 months ago
- ☆47May 27, 2023Updated 2 years ago