B2R2-org / FunSeeker
FunSeeker: Binary Function Identification Tool
☆24Updated last year
Alternatives and similar repositories for FunSeeker:
Users that are interested in FunSeeker are comparing it to the libraries listed below
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 3 weeks ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- AFLTeam Collaborative Parallel Fuzzing☆73Updated 2 years ago
- ☆53Updated 5 years ago
- ☆23Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- ☆41Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆24Updated 2 years ago
- ☆24Updated 10 months ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- ☆38Updated 4 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 5 years ago
- ☆25Updated 6 years ago
- ☆36Updated 2 years ago
- ☆16Updated 6 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- ☆16Updated 5 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Fuzzing with controlled compilation☆27Updated last year
- ☆20Updated 3 years ago
- Tutorial to write qemu plugins☆31Updated 7 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago