-
Institute of Software Chinese Academy of Sciences
- Beijing, China
Highlights
Tools
Ghidra is a software reverse engineering (SRE) framework
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…
RetroWrite -- Retrofitting compiler passes through binary rewriting
Run fuzzing experiments in Docker
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
PEDA - Python Exploit Development Assistance for GDB
This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.
american fuzzy lop (copy of the source code for easy access)
Memory Debugger for Windows, Linux, Mac, and Android
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
A fork and successor of the Sulley Fuzzing Framework
CTF framework and exploit development library
IDA plugin which queries language models to speed up reverse-engineering
syzkaller is an unsupervised coverage-guided kernel fuzzer
PromtFuzz is an automated tool that generates high-quality fuzz drivers for libraries via a fuzz loop constructed on mutating LLMs' prompts.
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)