CactiLab / UAFVerifLinks
☆11Updated 2 years ago
Alternatives and similar repositories for UAFVerif
Users that are interested in UAFVerif are comparing it to the libraries listed below
Sorting:
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- Security benchmarks for the Internet of Things☆22Updated 5 years ago
- ☆20Updated 7 years ago
- ☆26Updated 2 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- Protocol Inspection and State Machine Analysis☆23Updated 7 years ago
- This repository contains the code for a fuzzing prototype for the OP-TEE system call interface using AFL.☆141Updated 4 years ago
- ☆40Updated 5 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Updated 6 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Updated 5 years ago
- Fuzzing with controlled compilation☆30Updated 2 years ago
- ☆58Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 6 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- ☆82Updated 4 years ago
- ☆56Updated 6 years ago
- Static analysis for llvm☆20Updated 10 years ago
- ☆67Updated 5 years ago
- run AFL with pintool☆66Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆36Updated 4 years ago
- Default query sets for Joern☆26Updated 4 years ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- ☆25Updated 3 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆70Updated 4 years ago
- ☆19Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Updated 6 years ago