angr
Here are 58 public repositories matching this topic...
本科毕设. Fast-Symbolic-Emulation-Engine. 因受够了 angr 诞生的项目,当年帮我solve了很多ctf题目嘻嘻,不过符号执行部分很少维护了,后面可能会用来做一些程序分析,反混淆也是不错. ( 暖心tips: 设置private再public会丢失star喔, 可惜我那为数不多的30几个star ... )
-
Updated
Dec 23, 2021 - C
Here are some examples and solution of CTF Reverse Engineering and Pwning challenges where I have participated and solved using many tools such as Z3, Angr, IDA Pro and others software and tools.
-
Updated
Nov 22, 2018 - Smali
Implementation of ROP Attack Defense Technology Based on Reassemble
-
Updated
Jun 21, 2020 - Python
Memeful CTF training presentation on Angr and Control Flow Graphs made with ❤️ using LaTeX Beamer for the HKUST Firebird CTF Team.
-
Updated
Mar 3, 2023 - TeX
Scripts that I used to gather data for my research internship at ASU's SEFCOM Lab. My project centered around evaluating the decompilation quality of angr and GHIDRA
-
Updated
Jan 25, 2023 - Python
lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).
-
Updated
Dec 7, 2022 - Python
-
Updated
Aug 22, 2017 - C
Solution to the CMU Binary Bomblab using concolic execution (Angr framework by Shellphish).
-
Updated
Aug 9, 2020 - HTML
BINRELAY: Finding race conditions on binaries with symbolic execution.
-
Updated
Apr 16, 2020 - Python
Improve this page
Add a description, image, and links to the angr topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the angr topic, visit your repo's landing page and select "manage topics."