MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.
☆194Oct 29, 2022Updated 3 years ago
Alternatives and similar repositories for MATE
Users that are interested in MATE are comparing it to the libraries listed below
Sorting:
- cclyzer++ is a precise and scalable pointer analysis for LLVM code.☆150Jan 30, 2025Updated last year
- GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.☆272Jan 16, 2024Updated 2 years ago
- ☆12Nov 2, 2022Updated 3 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- ☆330Jun 20, 2024Updated last year
- ☆239Jan 14, 2024Updated 2 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆588Feb 20, 2026Updated 2 weeks ago
- CodeHawk Abstract Interpretation Engine and Analyzers☆74Updated this week
- A tool that automatically creates fuzzing harnesses based on a library☆285Nov 13, 2021Updated 4 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆736Apr 26, 2025Updated 10 months ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Jan 19, 2022Updated 4 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- UT based automated fuzz driver generation☆168Apr 16, 2025Updated 10 months ago
- A library to extract Code Property Graphs from C/C++, Java, Go, Python, Ruby and every other language through LLVM-IR.☆415Updated this week
- Symbiotic is a tool for finding bugs in computer programs based on instrumentation, program slicing and KLEE☆334Feb 25, 2026Updated last week
- Snapshot-based coverage-guided windows kernel fuzzer☆323Dec 16, 2021Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- SymCC: efficient compiler-based symbolic execution☆859May 12, 2025Updated 9 months ago
- A precise and scalable pointer analysis for LLVM, written in Ascent☆68Mar 1, 2025Updated last year
- Static Analyzer for LLVM bitcode based on Abstract Interpretation. **Update**: clam is still actively maintained. Please use branch dev1…☆287Apr 21, 2024Updated last year
- A lightweight dynamic instrumentation library☆1,314Updated this week
- Fuzzing Unification Framework☆380Jan 29, 2025Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆236Mar 14, 2022Updated 3 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- ☆32Feb 14, 2026Updated 3 weeks ago
- ☆134May 6, 2024Updated last year
- Snapshot fuzzing with KVM and LibAFL☆96Aug 21, 2022Updated 3 years ago
- AFL binary instrumentation☆307Jan 17, 2025Updated last year
- A powerful static binary rewriting tool☆1,095Updated this week
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆75Nov 27, 2021Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Mar 30, 2020Updated 5 years ago
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- ☆189Mar 21, 2025Updated 11 months ago
- BinRec: Dynamic Binary Lifting and Recompilation☆149Sep 18, 2023Updated 2 years ago