anhvvcs / coranaLinks
Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) of IoT malware under the presence of obfuscation techniques e.g., indirect jumps and opaque predicates
☆29Updated last year
Alternatives and similar repositories for corana
Users that are interested in corana are comparing it to the libraries listed below
Sorting:
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 4 years ago
- ☆53Updated 6 years ago
- Recover mutation graph from an AFL seed☆59Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- Concolic Execution Fuzzer☆24Updated 4 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 8 years ago
- run AFL with pintool☆66Updated 5 years ago
- ☆47Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆60Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- ☆55Updated 5 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- ☆16Updated 7 years ago
- ☆41Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- Utilities for generating dynamic traces☆94Updated 10 months ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- ☆26Updated 3 years ago
- experiments for IJON☆12Updated 6 years ago
- ☆16Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆96Updated 6 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 10 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Updated 5 years ago