software-engineering-and-security / inspector-gadgetLinks
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
☆25Updated 5 years ago
Alternatives and similar repositories for inspector-gadget
Users that are interested in inspector-gadget are comparing it to the libraries listed below
Sorting:
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆42Updated 3 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- Load function names from an IDA Pro database inside GDB☆21Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- tool for multi-execution jump coverage introspection☆65Updated 6 months ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- Tutorial to write qemu plugins☆33Updated 8 years ago
- Build your emulation environment as needed☆67Updated 4 years ago
- ☆31Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆47Updated 2 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- ☆14Updated 5 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 3 years ago