1. Rocket ShotBackwards program slice stitching for automatic CTF problem solving.
2. ZeratoolAutomatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
3. Firmware slapDiscovering vulnerabilities in firmware through concolic analysis and function clustering.
4. PinctfUsing Intel's PIN tool to solve CTF problems
5. Easy-PickingsAutomatic function exporting and linking for fuzzing cross-architecture binaries.