A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
☆22Oct 12, 2022Updated 3 years ago
Alternatives and similar repositories for Heap-Overflow-Detection
Users that are interested in Heap-Overflow-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- ☆18Sep 23, 2024Updated last year
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 3 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- Binary (In)security tool☆25May 27, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- A static binary vulnerability scanner☆55Apr 21, 2019Updated 7 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 8 years ago
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated 2 years ago
- JP2KLib.dll harness for WinAFL☆43Apr 20, 2021Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Apr 13, 2023Updated 3 years ago
- Some sample codes for blog article☆13Sep 15, 2022Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆47Mar 15, 2021Updated 5 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆11Jan 3, 2022Updated 4 years ago
- windows rootkit☆60May 2, 2024Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- angr's exploration technique to perform taint analysis☆62Mar 26, 2020Updated 6 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Symbolic range analysis for LLVM.☆12Jan 10, 2016Updated 10 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- ☆12Jul 25, 2020Updated 5 years ago
- Symbolic Liveness Analysis of real-world software building upon KLEE to detect liveness violations (e.g. infinite loop bugs)☆12Dec 16, 2021Updated 4 years ago
- Fully Randomized Pointers☆19Jun 10, 2025Updated 10 months ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 7 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binarie…☆14Sep 23, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A few examples of how to trap virtual memory access on Windows.☆41Dec 18, 2024Updated last year
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆136Jun 7, 2024Updated last year
- idax: IDASDK extension libraries☆24Oct 12, 2025Updated 6 months ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 9 years ago
- ☆22May 10, 2022Updated 3 years ago
- Export IDA microcode to BinExport format so that you can use BinDiff to diff microcodes☆12Sep 21, 2024Updated last year