H4oK3 / interrupt_analysis
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for interrupt_analysis
- S2E plugins library☆17Updated 4 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- ☆19Updated 4 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 9 years ago
- The collection of programs for evaluating fuzzing techniques☆19Updated 6 years ago
- ☆20Updated 2 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- S2E Core Engine Library☆15Updated 4 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 6 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- AFL fuzzing coverage CFG visualization☆30Updated 6 years ago
- ☆9Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- Some tools☆10Updated 6 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- experiments for IJON☆11Updated 5 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- The Binary Mutation code based on Uroboros☆14Updated 5 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆14Updated 8 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 6 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 5 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago