Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management functions and uses data flow analysis to abstract their behaviors and then adopts these summaries to enhace bug detection.
☆102Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for Goshawk
Users that are interested in Goshawk are comparing it to the libraries listed below
Sorting:
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆50Sep 25, 2024Updated last year
- ☆239Jan 14, 2024Updated 2 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- ☆23Oct 28, 2022Updated 3 years ago
- PromtFuzz is an automated tool that generates high-quality fuzz drivers for libraries via a fuzz loop constructed on mutating LLMs' promp…☆314Updated this week
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆61May 16, 2025Updated 9 months ago
- ☆82Sep 3, 2021Updated 4 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- Bug detection framework for finding Finger tracable bugs in Linux☆20Mar 23, 2025Updated 11 months ago
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆33Feb 28, 2023Updated 3 years ago
- Record my learn path of HEAP EXPLOITATION on LINUX☆14Feb 2, 2018Updated 8 years ago
- Saryn: Fuzzing with Taint Inference☆16Jun 16, 2022Updated 3 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- ☆73Jun 26, 2024Updated last year
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆194Oct 29, 2022Updated 3 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- A data-flow-guided fuzzer☆124Aug 19, 2023Updated 2 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- BinTuner☆66Jul 25, 2022Updated 3 years ago
- AFL/AFL++ version FishFuzz☆98Mar 11, 2025Updated 11 months ago
- ☆34Jun 5, 2023Updated 2 years ago
- Hopper is a tool for generating fuzzing test cases for libraries automatically using interpretative fuzzing.☆266Jun 20, 2025Updated 8 months ago
- A Cross-Language Dynamic Information Flow Analysis.☆28Nov 29, 2022Updated 3 years ago
- ☆23Apr 7, 2022Updated 3 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆133Jun 7, 2024Updated last year
- Source code for the DEF CON 33 CTF Finals.☆25Aug 26, 2025Updated 6 months ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- The Art, Science, and Engineering of Fuzzing: A Survey☆229Jan 3, 2026Updated 2 months ago
- ☆58May 10, 2024Updated last year
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Aug 16, 2023Updated 2 years ago
- ☆99Dec 1, 2023Updated 2 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- User Guided API Misuse Detection☆30Dec 9, 2022Updated 3 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago