reverseame / rop3Links
A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure
☆19Updated 2 years ago
Alternatives and similar repositories for rop3
Users that are interested in rop3 are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 6 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 10 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 3 weeks ago
- A library for patching ELFs☆57Updated 5 years ago
- ☆61Updated 4 months ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- Xyntia, the black-box deobfuscator☆84Updated last month
- Slides about HyperDbg☆40Updated 4 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- ☆84Updated 3 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 3 weeks ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated this week
- binary ninja related code☆37Updated 8 months ago
- Repo for fuzzing projects☆46Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- ☆68Updated 9 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆71Updated 6 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- ☆81Updated 6 months ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Updated 4 years ago
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- ☆50Updated 3 years ago