Samsung / auto_off_target
AoT is a system for automatically generating off-target test harness by using build information.
☆37Updated last month
Alternatives and similar repositories for auto_off_target:
Users that are interested in auto_off_target are comparing it to the libraries listed below
- Produce code coverage results with gcov from afl-fuzz test cases☆73Updated 3 weeks ago
- ☆47Updated last year
- Repository for monolithic firmware blobs☆72Updated 2 years ago
- Code Aware Services (CAS) is a set of tools for extracting information from a (especially large) source code trees. It consists of Build …☆46Updated 3 months ago
- A data-flow-guided fuzzer☆111Updated last year
- The Use of Likely Invariants as Feedback for Fuzzers☆88Updated 3 years ago
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing☆27Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆83Updated last week
- UT based automated fuzz driver generation☆164Updated 2 weeks ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆22Updated 9 months ago
- ☆57Updated last year
- ☆135Updated 2 months ago
- Symbolic Execution Over Processor Traces☆118Updated 5 months ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆61Updated last year
- Material and examples for a presentation on static binary analysis.☆40Updated 3 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated last month
- A Specification-Guided Approach for Firmware Emulation☆38Updated 7 months ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆114Updated last year
- A Framework for fuzzing USB Drivers by Device Emulation☆115Updated 3 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆169Updated 2 years ago
- ☆54Updated 2 months ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆73Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆141Updated last year
- A versatile and easy-to-use static binary patching tool.☆33Updated last week
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆75Updated 2 years ago
- A LLVM Sanitizer for Symbolic Tracing☆212Updated 4 months ago
- KFLAT is a tool to serialize memory of selected variables from the running Linux kernel and organize it into a single memory block of con…☆24Updated last month
- ☆80Updated 8 months ago
- ☆23Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆64Updated 2 years ago