season-lab / symnavLinks
☆21Updated 5 years ago
Alternatives and similar repositories for symnav
Users that are interested in symnav are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- kAFL Fuzzer☆34Updated 6 months ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆83Updated 2 weeks ago
- A coverage-based software testing tool☆34Updated 4 years ago
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆41Updated 2 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆93Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆29Updated last year
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆38Updated last year
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- Practical Data-Only Attack Generation☆41Updated last year
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆33Updated 2 months ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Updated 3 years ago
- Binary exploitation by confusing the unwinder☆64Updated 2 years ago
- ☆43Updated 3 years ago
- ☆48Updated 3 years ago
- Xyntia, the black-box deobfuscator☆75Updated 3 months ago
- ☆53Updated 2 months ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- ☆90Updated 3 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 7 months ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆57Updated 3 years ago
- ☆44Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago