A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
☆22Oct 12, 2022Updated 3 years ago
Alternatives and similar repositories for Heap-Overflow-Detection
Users that are interested in Heap-Overflow-Detection are comparing it to the libraries listed below
Sorting:
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- ☆17Sep 23, 2024Updated last year
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- 《Nature》&《Science》发表的AI相关文章☆13Sep 7, 2021Updated 4 years ago
- Replication of AST Neural Network from Zhang J. et. al (2019) and application to software vulnerability detection☆12Jan 13, 2020Updated 6 years ago
- Binary (In)security tool☆25May 27, 2024Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- ☆21Dec 4, 2020Updated 5 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- ☆27Dec 29, 2024Updated last year
- A repository for code risk analysis, bug prediction, software fault detection, software vulnerability detection, Quality analysis.☆19May 3, 2021Updated 4 years ago
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated last year
- JP2KLib.dll harness for WinAFL☆43Apr 20, 2021Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- ☆13Apr 13, 2023Updated 2 years ago
- Material and examples for a presentation on static binary analysis.☆46Mar 15, 2021Updated 5 years ago
- Some sample codes for blog article☆13Sep 15, 2022Updated 3 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- Latest PASTE (NSDI'18) repository☆13May 2, 2022Updated 3 years ago
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆11Jan 3, 2022Updated 4 years ago
- windows rootkit☆60May 2, 2024Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- angr's exploration technique to perform taint analysis☆63Mar 26, 2020Updated 5 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Symbolic range analysis for LLVM.☆12Jan 10, 2016Updated 10 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- Symbolic Liveness Analysis of real-world software building upon KLEE to detect liveness violations (e.g. infinite loop bugs)☆12Dec 16, 2021Updated 4 years ago
- ☆11Jul 25, 2020Updated 5 years ago
- Fully Randomized Pointers☆19Jun 10, 2025Updated 9 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 7 years ago
- A few examples of how to trap virtual memory access on Windows.☆42Dec 18, 2024Updated last year
- ☆12Jun 20, 2022Updated 3 years ago
- Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binarie…☆14Sep 23, 2021Updated 4 years ago