SoftwareSecurityLab / UbSymLinks
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
☆43Updated 2 years ago
Alternatives and similar repositories for UbSym
Users that are interested in UbSym are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Python bindings for BochsCPU☆37Updated 4 months ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated this week
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 6 months ago
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- ☆19Updated 3 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago
- ☆25Updated last year
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- ☆21Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 6 months ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated 2 years ago
- ☆19Updated 5 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- IDA (sort of) headless☆26Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- binary ninja related code☆37Updated 8 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- weggli ruleset scanner for source code and binaries☆35Updated 3 weeks ago
- ☆61Updated 4 months ago
- ☆19Updated 2 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Updated 4 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 10 months ago