A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
☆43May 7, 2023Updated 2 years ago
Alternatives and similar repositories for UbSym
Users that are interested in UbSym are comparing it to the libraries listed below
Sorting:
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 4 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆26Feb 2, 2026Updated 3 weeks ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- Collect computer related materials and codes☆20Jan 16, 2026Updated last month
- Angha is a framework for constructing compilable synthetic C benchmarks out of publicly available C repositories.☆23Jul 7, 2023Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Oct 2, 2022Updated 3 years ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Jul 6, 2023Updated 2 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- A library for dynamic binary rewriting☆59Feb 10, 2021Updated 5 years ago
- ☆19Apr 7, 2023Updated 2 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Oct 1, 2021Updated 4 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆23May 31, 2023Updated 2 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- ☆45Apr 12, 2022Updated 3 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆82Nov 14, 2022Updated 3 years ago
- Lightweight x86-64 disassembling library☆44Aug 22, 2022Updated 3 years ago
- A (SLEIGH) disassembler that supports multiple architectures☆91Apr 30, 2022Updated 3 years ago
- LLVM Without The ROP Gadgets!☆25Jan 9, 2024Updated 2 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- gradient-based symbolic execution engine implemented from scratch☆36Dec 16, 2023Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- The next generation reverse engineering IDE (work-in-progress).☆105Jun 27, 2024Updated last year
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆21Mar 24, 2021Updated 4 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago
- Tutorial for Building Program Reasoning Tools using LLVM and Z3☆19Jan 20, 2020Updated 6 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆52Jul 31, 2024Updated last year