software-engineering-and-security / inspector-gadgetLinks
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
☆25Updated 5 years ago
Alternatives and similar repositories for inspector-gadget
Users that are interested in inspector-gadget are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Updated last week
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- IDA (sort of) headless☆24Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆17Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆9Updated 6 years ago
- Superion Mutator for AFLPlusPlus☆31Updated last year
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- Get actually nice HTML coverage overview on libfuzzer runs☆29Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆31Updated 4 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Updated 2 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Build your emulation environment as needed☆67Updated 4 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- ☆18Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 6 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- ☆15Updated 5 years ago