👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
☆34Nov 7, 2021Updated 4 years ago
Alternatives and similar repositories for BinV
Users that are interested in BinV are comparing it to the libraries listed below
Sorting:
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- ☆10Sep 10, 2022Updated 3 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- 学习angr用,里面可能啥都有☆10May 8, 2019Updated 6 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆39Updated this week
- ☆14Dec 10, 2021Updated 4 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆58Jan 15, 2025Updated last year
- ☆14Oct 11, 2017Updated 8 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- ☆15Aug 16, 2021Updated 4 years ago
- ☆21Nov 14, 2024Updated last year
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- ☆17Apr 18, 2019Updated 6 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Fuzzing with the generated argument☆33Jan 6, 2023Updated 3 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71May 27, 2021Updated 4 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 4 years ago
- ☆17Sep 23, 2024Updated last year