Yanivmd / TRACY
TRACY
☆19Updated 8 years ago
Alternatives and similar repositories for TRACY:
Users that are interested in TRACY are comparing it to the libraries listed below
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 8 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- ☆50Updated 7 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- ☆70Updated 5 years ago
- ☆63Updated 3 years ago
- ☆56Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago
- ☆96Updated 5 years ago
- Utilities for generating dynamic traces☆90Updated 2 years ago
- Experimental translation of llvm to smt.☆56Updated 4 years ago
- Tool for detecting error handling bugs☆22Updated 8 years ago
- CRETE under development☆59Updated 4 years ago
- git://g.csail.mit.edu/kint☆49Updated 11 years ago
- Program Analysis for LLVM☆36Updated 7 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆65Updated 3 years ago
- A survey by the SEASON lab on symbolic execution tools and techniques. The survey has appeared in ACM CSUR in 2018.☆81Updated 6 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆72Updated 7 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 9 months ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago