trailofbits / ManticoreUILinks
The Manticore User Interface with plugins for Binary Ninja and Ghidra
☆75Updated last year
Alternatives and similar repositories for ManticoreUI
Users that are interested in ManticoreUI are comparing it to the libraries listed below
Sorting:
- Differential fuzzing for Smart Contract VMs☆51Updated 3 years ago
- ☆59Updated 2 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆64Updated 5 years ago
- ☆68Updated 2 years ago
- single file ctf/exploit client library - python3, type annotated☆70Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 4 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last month
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆52Updated last year
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated 9 months ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆37Updated 3 years ago
- A library for patching ELFs☆61Updated 5 years ago
- The Ghidra EVM Module (ghidra-evm) leverages Ghidra 9.1.2 to disassemble and analyze compiled Ethereum smart contracts. Ghidra-evm was pr…☆146Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- An educational toy fuzzer with big dreams☆12Updated 2 years ago
- ☆37Updated 2 years ago
- ☆12Updated 8 years ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆47Updated 3 years ago
- ☆86Updated 2 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Practical fuzzing tutorials and training☆31Updated last year