OSUSecLab / AutoMapLinks
☆10Updated 2 years ago
Alternatives and similar repositories for AutoMap
Users that are interested in AutoMap are comparing it to the libraries listed below
Sorting:
- ☆61Updated 3 years ago
- Source code of SEmu-Fuzz☆22Updated 9 months ago
- Directed fuzzing framework for gVisor.☆25Updated last year
- ☆25Updated 11 months ago
- ☆55Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- The published code repo for the Cortex-M SoK paper.☆19Updated 2 months ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Updated 3 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆10Updated 8 months ago
- ViDeZZo source code.☆36Updated 4 months ago
- ☆28Updated 3 years ago
- ☆46Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆63Updated last year
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆83Updated 2 months ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated 8 months ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆142Updated last year
- Syzkaller with MAB scheduling and seed selection☆24Updated 5 years ago
- ☆34Updated 2 years ago
- ☆80Updated 3 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- ☆38Updated 2 years ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆29Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆27Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated last month
- ☆28Updated 2 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆81Updated 7 months ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- ☆70Updated last year