thebabush / reflex
Flex 'em lexers
☆39Updated 4 years ago
Alternatives and similar repositories for reflex:
Users that are interested in reflex are comparing it to the libraries listed below
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago
- Utilities for generating dynamic traces☆90Updated 2 years ago
- ☆96Updated 5 years ago
- This repository contains the currently implemented angr concrete targets.☆33Updated last year
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆53Updated 5 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆137Updated 3 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- ☆38Updated 4 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆55Updated 2 months ago
- ☆48Updated 4 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 3 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆50Updated 9 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 3 months ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- ☆15Updated 5 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆27Updated 7 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- Patches to afl to fix bugs or add enhancements☆80Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆99Updated 5 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆122Updated last year