thebabush / reflexLinks
Flex 'em lexers
☆40Updated 4 years ago
Alternatives and similar repositories for reflex
Users that are interested in reflex are comparing it to the libraries listed below
Sorting:
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 4 years ago
- Utilities for generating dynamic traces☆93Updated 4 months ago
- ☆96Updated 6 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- Target-centric program analysis.☆77Updated last week
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- Nampa - FLIRT for (binary) ninjas☆95Updated 8 months ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆210Updated 3 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 8 months ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆133Updated 2 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 3 years ago
- This repository contains the currently implemented angr concrete targets.☆34Updated last year
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- A PCode Emulator for Ghidra.☆110Updated 4 years ago
- ☆38Updated 5 years ago
- A patched version of VEX to work with PyVEX.☆111Updated last week
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- A collection of extensions to angr to handle new platforms☆67Updated 4 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- Hashashin: A Fuzzy Matching Tool for Binary Ninja☆94Updated last year