SoftSec-KAIST / BotScreenLinks
BotScreen: Trust Everybody, but Cut the Aimbots Yourself (USENIX Security '23)
☆13Updated last year
Alternatives and similar repositories for BotScreen
Users that are interested in BotScreen are comparing it to the libraries listed below
Sorting:
- A public repository for the class, "Software Security" at Seoul National University (SNU)☆13Updated 4 years ago
- Solidity Exploit Helper v.0.2☆30Updated 6 years ago
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing☆31Updated 2 years ago
- FunProbe: Probing Functions from Binary Code through Probabilistic Analysis (ESEC/FSE '23)☆16Updated last month
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆13Updated 9 months ago
- Fuzzle: Making a Puzzle for Fuzzers (ASE'22)☆44Updated last year
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆81Updated last year
- ☆144Updated 9 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- 2018s-IS521☆9Updated 7 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆25Updated last year
- A LLVM Sanitizer for Symbolic Tracing☆223Updated last month
- Implementation of DigFuzz (NDSS19 "Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing")☆21Updated 3 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆261Updated 5 months ago
- Kernel fuzzer inspired by Syzkaller.☆280Updated 3 years ago
- Source code release for the KRace project☆29Updated 3 years ago
- ☆66Updated last year
- UT based automated fuzz driver generation☆167Updated 3 months ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- ☆54Updated this week
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Updated 3 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆14Updated 10 months ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆43Updated last year
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆156Updated 4 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆188Updated last year
- ☆25Updated 3 months ago
- Symbolic Execution Over Processor Traces☆122Updated 11 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated last year