anhvvcs / coranaLinks
Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) of IoT malware under the presence of obfuscation techniques e.g., indirect jumps and opaque predicates
☆28Updated last year
Alternatives and similar repositories for corana
Users that are interested in corana are comparing it to the libraries listed below
Sorting:
- ☆53Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Concolic Execution Fuzzer☆24Updated 4 years ago
- run AFL with pintool☆66Updated 5 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- ☆16Updated 7 years ago
- Utilities for generating dynamic traces☆93Updated 7 months ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆70Updated 3 years ago
- ☆96Updated 6 years ago
- ☆39Updated 5 years ago
- The tools used to train the models used for the ICISC paper "Recurrent neural networks for fuzz testing web browsers"☆28Updated 6 years ago
- ☆47Updated 5 years ago
- The PT tracing portion of Barnum.☆11Updated 6 years ago
- run AFL with dynamorio☆37Updated 5 years ago
- experiments for IJON☆12Updated 6 years ago
- ☆32Updated 3 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Updated 4 years ago
- Measure Basic Blocks coverage of all testcases in the AFL queue using a patched QEMU☆23Updated last year
- ☆98Updated 5 years ago