software-engineering-and-security / inspector-gadget
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
☆25Updated 5 years ago
Alternatives and similar repositories for inspector-gadget:
Users that are interested in inspector-gadget are comparing it to the libraries listed below
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- ☆30Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆41Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- First level taint implementation with qemu for linux user mode☆27Updated 4 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Updated 3 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated this week
- ☆9Updated 6 years ago
- Build your emulation environment as needed☆66Updated 3 years ago
- BigMap integration on AFL++☆15Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆30Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆29Updated 3 years ago
- Linux kernel branches for confidential compute research☆17Updated this week
- Superion Mutator for AFLPlusPlus☆32Updated last year
- IDA (sort of) headless☆24Updated last year
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆46Updated 4 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago