S2E / libs2eplugins
S2E plugins library
☆17Updated 5 years ago
Alternatives and similar repositories for libs2eplugins:
Users that are interested in libs2eplugins are comparing it to the libraries listed below
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Crappy Win32k syscall fuzzer☆13Updated 9 years ago
- ☆8Updated 8 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 6 years ago
- taint tracer/analysis pintool☆24Updated 10 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- ☆15Updated 9 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 10 years ago
- code emulator base on unicorn engine☆50Updated 6 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 7 years ago
- Expression generator for WebAssembly☆18Updated 6 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Updated 11 years ago
- ☆14Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- ☆31Updated 7 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 11 years ago
- ☆19Updated 5 years ago
- adobe afdko fuzz☆41Updated 5 years ago