H4oK3 / interrupt_analysis
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for interrupt_analysis
- S2E plugins library☆17Updated 4 years ago
- The collection of programs for evaluating fuzzing techniques☆19Updated 6 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 9 years ago
- ☆19Updated 2 years ago
- The Binary Mutation code based on Uroboros☆14Updated 5 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- S2E Core Engine Library☆15Updated 4 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 6 years ago
- QEMU to drcov trace file☆11Updated 3 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago
- ☆9Updated 5 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆14Updated 8 years ago
- Some tools☆10Updated 6 years ago
- ☆19Updated 4 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- API logger plugin for Intel Pintool☆14Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Random Codes Related to Reverse Engineering☆9Updated last year