qiqi1 / taint_angrLinks
基于angr的污点分析引擎
☆41Updated 6 years ago
Alternatives and similar repositories for taint_angr
Users that are interested in taint_angr are comparing it to the libraries listed below
Sorting:
- angr源码分析☆33Updated 5 years ago
- linux system call hook framework☆47Updated 6 years ago
- The Frida based fuzzer all in one☆30Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- A Coverage-Based fuzzing tools☆23Updated 4 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆34Updated 5 years ago
- ☆15Updated 5 years ago
- some ida script☆34Updated 4 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Updated 3 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 7 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- CTF pwn工具,一个快速搭建任何版本环境的工具、使用chroot具备环境隔离、ida自动加载DWARF、被调试程序输入输出重定向等功能☆16Updated 4 years ago
- A IDAPython script for searching overflows by IDA.☆21Updated 7 years ago
- IoT Security Papers☆48Updated 5 years ago
- A bunch of JEB python scripts☆46Updated 4 years ago
- IDA_Signsrch in Python☆104Updated 5 years ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 7 years ago
- ☆56Updated 3 years ago
- An IDA processor for eBPF bytecode☆67Updated 10 months ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- A collection of POP exploits.☆30Updated 4 years ago
- ☆80Updated 7 years ago
- android app native so fuzz. efficiently run in a real machine with frida environment. See Background: https://idhyt.blogspot.com/2020/02/…☆44Updated last year
- This is an IDA plugin to recover class information from C++ binary.☆18Updated 5 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 6 years ago
- IDAPython / IDC tips and tricks☆38Updated 2 years ago
- ☆24Updated last year
- Qemu Fuzzer.针对Qemu模拟设备的模糊 测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆45Updated 3 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆90Updated 2 years ago