software-engineering-and-security / inspector-gadget
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
☆18Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for inspector-gadget
- expansion of afl-unicorn using c++☆27Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Ditto.☆16Updated 4 years ago
- ☆30Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆38Updated last year
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 2 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 6 years ago
- ☆17Updated 2 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- QEMU to drcov trace file☆11Updated 3 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆19Updated last year
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆27Updated 3 years ago
- Malware analysis tool based on taint analysis.☆14Updated 2 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 2 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆44Updated 4 years ago
- Dynamic binary translator for x86 binaries☆32Updated last year
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 2 years ago
- ☆9Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago