#

angr

https://static.github-zh.com/github_avatars/angr?size=40

A powerful and user-friendly binary analysis platform!

Python 8.2 k
2 天前
https://static.github-zh.com/github_avatars/alphaSeclab?size=40

Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)

4.76 k
4 年前
https://static.github-zh.com/github_avatars/decompiler-explorer?size=40

Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!

Python 2.44 k
10 小时前
https://static.github-zh.com/github_avatars/ChrisTheCoolHut?size=40

Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems

Python 1.14 k
2 年前
https://static.github-zh.com/github_avatars/angr?size=40
Python 1.06 k
1 天前
https://static.github-zh.com/github_avatars/ChrisTheCoolHut?size=40

Discovering vulnerabilities in firmware through concolic analysis and function clustering.

Python 477
5 年前
https://static.github-zh.com/github_avatars/mborgerson?size=40

Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.

Python 457
3 年前
https://static.github-zh.com/github_avatars/axt?size=40

Handy utilities for the angr binary analysis framework, most notably CFG visualization

Python 292
7 年前
https://static.github-zh.com/github_avatars/andreafioraldi?size=40

Use angr in the IDA Pro debugger generating a state from the current debug session

Python 280
5 年前
https://static.github-zh.com/github_avatars/FSecureLABS?size=40
Python 230
5 年前
https://static.github-zh.com/github_avatars/andreafioraldi?size=40

Use angr inside GDB. Create an angr state from the current debugger state.

Python 200
5 年前
https://static.github-zh.com/github_avatars/Hustcw?size=40
Python 158
5 年前
https://static.github-zh.com/github_avatars/ercoppa?size=40

Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.

Python 135
4 年前
https://static.github-zh.com/github_avatars/csvl?size=40

SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SC...

Python 115
7 个月前
https://static.github-zh.com/github_avatars/mahaloz?size=40

The SAILR paper's evaluation pipline for measuring the quality of decompilation

Python 115
1 年前
https://static.github-zh.com/github_avatars/axt?size=40
JavaScript 83
1 年前
https://static.github-zh.com/github_avatars/purseclab?size=40

#计算机科学#A decompiler to automatically reverse-engineer the DNN semantics from its compiled binary using program analysis

Python 82
10 个月前
https://static.github-zh.com/github_avatars/ChrisTheCoolHut?size=40

A tool for finding the one gadget RCE in libc

Python 78
5 年前
https://static.github-zh.com/github_avatars/zautumnz?size=40
Vim Script 76
2 年前
loading...
Website
Wikipedia