software-engineering-and-security / inspector-gadgetLinks
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
☆25Updated 5 years ago
Alternatives and similar repositories for inspector-gadget
Users that are interested in inspector-gadget are comparing it to the libraries listed below
Sorting:
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- ☆31Updated 5 years ago
- Load function names from an IDA Pro database inside GDB☆21Updated 6 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆76Updated 3 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- Build your emulation environment as needed☆65Updated 4 years ago
- ☆43Updated 3 years ago
- Ghidra Emulates Functions☆55Updated 4 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 4 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Updated 6 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Updated 3 years ago