angr / pysootLinks
Python bindings for Shimple/Jimple IR from Soot.
☆42Updated 4 months ago
Alternatives and similar repositories for pysoot
Users that are interested in pysoot are comparing it to the libraries listed below
Sorting:
- COVA - A static analysis tool to compute path conditions☆39Updated 4 months ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆124Updated 4 years ago
- Pythia (extends AFL with Predictions)☆66Updated 4 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 5 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- Time-travel Testing☆104Updated 3 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆83Updated 5 months ago
- ☆106Updated last year
- A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to…☆46Updated 5 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 6 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 6 years ago
- List the real world programs evaluated in fuzzing papers.☆56Updated 6 years ago
- Benchmark apps for static analyzing native world of Android applications.☆13Updated 7 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆65Updated 2 years ago
- fuzzing + concolic = fuzzolic :)☆127Updated 2 weeks ago
- ☆82Updated 3 months ago
- Superion is a fuzzer which extends the famous AFL to support structured inputs such as JavaScript and XML.☆137Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Updated 3 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆68Updated 6 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference (ICSE '20)☆54Updated 5 years ago
- ☆98Updated 5 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- The parser-directed Fuzzer☆39Updated 5 years ago
- This is the project of LearnAFL.☆28Updated 5 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago