Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-angr
A collection of resources/tools and analyses for the angr binary analysis framework.
https://github.com/degrigis/awesome-angr
Last synced: 2 days ago
JSON representation
-
Documentation :book:
- docs.angr.op - Official angr general documentatoin website.
- angr.io - Official angr API documentation.
-
Projects :rocket:
- Mechaphish - AEG system for CGC.
- FirmXRay-angr - An angr version of the base address detection analysis implemented in [FirmXRay](https://github.com/OSUSecLab/FirmXRay).
- IVTSpotter - An IVT Spotter for monolithic ARM firmware images.
-
Blogposts :newspaper:
- angr-blog - Official angr blog.
- A reaching definition engine for binary analysis built-in in angr. - A walk-through of the ReachingDefinition analysis built-in in angr.
- shellphish-phrack - Phrack article on [Mechaphish](https://github.com/mechaphish), the AEG system based on angr that got 3rd place at the CGC.
- angr-tutorial - Introduction to angr - baby steps in symbolic execution.
-
Papers :page_with_curl:
- Heapster: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
- Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs
- Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths
- Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing
- Jetset: Targeted Firmware Rehosting for Embedded Systems
- SoK: All You Ever Wanted to Know About x86/x64 Binary Disassembly But Were Afraid to Ask
- SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
- DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
- Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
- Towards Constant-Time Foundations for the New Spectre Era
- Symbion: Interleaving Symbolic with Concrete Execution
- KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
- KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities
- BugMiner: Mining the Hard-to-Reach Software Vulnerabilities through the Target-Oriented Hybrid Fuzzer
- Enhancing Symbolic Execution by Machine Learning Based Solver Selection
- BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation
- Sleak: Automating Address Space Layout Derandomization
- Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries
- HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security
- Efficient Extraction of Malware Signatures Through System Calls and Symbolic Execution: An Experience Report
- Dynamic Path Pruning in Symbolic Execution
- On Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs
- Rethinking Pointer Reasoning in Symbolic Execution
- Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
- BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
- Ramblr: Making Reassembly Great Again
- BootStomp: On the Security of Bootloaders in Mobile Devices
- Piston: Uncooperative Remote Runtime Patching
- SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis
- Driller: Augmenting Fuzzing Through Selective Symbolic Execution
- Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
Categories
Sub Categories