anhvvcs / coranaView external linksLinks
Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) of IoT malware under the presence of obfuscation techniques e.g., indirect jumps and opaque predicates
☆29Mar 6, 2024Updated last year
Alternatives and similar repositories for corana
Users that are interested in corana are comparing it to the libraries listed below
Sorting:
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- A Static Code Feature Extraction Tool for Java and Android☆21Jun 7, 2023Updated 2 years ago
- Automate repetitive tasks for fuzzing☆124Jul 26, 2021Updated 4 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- ☆13May 5, 2018Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- A framework for control-flow recovery in binary programs.☆10Jul 11, 2018Updated 7 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- ☆10Oct 30, 2016Updated 9 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- A formally verified bug finder☆14Nov 25, 2024Updated last year
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- ☆25Feb 21, 2019Updated 6 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- ☆15Jan 17, 2024Updated 2 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Symbolic execution of LLVM IR☆14Jan 3, 2024Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- Cheat Sheets of the tools/programming languages☆11Jul 8, 2018Updated 7 years ago
- Source code of the paper "FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization"☆13Jan 6, 2026Updated last month
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- TracerX Symbolic Virtual Machine☆32Sep 24, 2025Updated 4 months ago
- ☆14Oct 11, 2017Updated 8 years ago
- Assume-Guarantee REasoning Environment☆19Dec 3, 2025Updated 2 months ago
- ☆14Dec 10, 2021Updated 4 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 2 years ago
- The Michelson Symbolic vErifier☆13Feb 3, 2023Updated 3 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Apr 7, 2019Updated 6 years ago
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago