software-engineering-and-security / inspector-gadget
Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analysts in exploit development. It discovers gadgets, chains gadgets together, and ensures that side effects such as register dereferences do not crash the program.
☆23Updated 5 years ago
Alternatives and similar repositories for inspector-gadget:
Users that are interested in inspector-gadget are comparing it to the libraries listed below
- ☆30Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- Build your emulation environment as needed☆64Updated 3 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Updated 3 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆16Updated last year
- Dynamic binary translator for x86 binaries☆33Updated last year
- IDA (sort of) headless☆22Updated 11 months ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 2 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- ☆23Updated 2 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- ☆9Updated 5 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- ☆18Updated 3 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago