Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app
☆43May 19, 2020Updated 5 years ago
Alternatives and similar repositories for LeakScope
Users that are interested in LeakScope are comparing it to the libraries listed below
Sorting:
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46May 31, 2020Updated 5 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- ☆19Jan 8, 2019Updated 7 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- ☆10Nov 9, 2023Updated 2 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 5 months ago
- ☆11Oct 28, 2020Updated 5 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- Open sourced implementation of a prototype for Hyperledger Fabric chaincode execution with OP-TEE. This work is part of the master thesis…☆14Sep 10, 2019Updated 6 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- ☆13Aug 18, 2025Updated 6 months ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- Simple memory benchmarking of Intel SGX☆12Aug 22, 2016Updated 9 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆55Mar 17, 2025Updated 11 months ago
- Static Cross-Entry UAF Detector☆23Apr 28, 2025Updated 10 months ago
- ☆14Aug 17, 2024Updated last year
- ☆16Nov 13, 2023Updated 2 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 5 years ago
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 2 years ago
- haze binary fuzzer☆56May 19, 2024Updated last year
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆11Dec 18, 2017Updated 8 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- ☆16Jun 21, 2024Updated last year
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 5 months ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- ☆35Jul 23, 2023Updated 2 years ago
- Some problems for RHG(Robo Hacking Game)☆15Apr 30, 2021Updated 4 years ago
- Reference material for libbeauty☆25Aug 6, 2022Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- ☆71Oct 25, 2024Updated last year
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year