aronszanto / wasm-taint-tracking
JavaScript virtual machine for WebAssembly and Taint Tracking security tool
☆14Updated 7 years ago
Alternatives and similar repositories for wasm-taint-tracking:
Users that are interested in wasm-taint-tracking are comparing it to the libraries listed below
- Implementing taint tracking in WebAssembly as a part of the V8 Javascript Engine.☆21Updated 6 years ago
- JITed Taint Tracking in V8☆15Updated 10 years ago
- A tool designed to synthesise semantically correct JavaScript snippets given arbitrary data. Useful for fuzzing.☆54Updated last year
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.☆32Updated 3 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆17Updated 3 years ago
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆17Updated 2 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Updated 7 years ago
- A Python module that aids in the automation of Firefox at the process level☆32Updated this week
- Improving security and resilience of WebAssembly VMs/runtimes/parsers using fuzzing☆87Updated 6 months ago
- DOM fuzzers - not maintained anymore☆15Updated 5 years ago
- Downloader for Firefox/jsshell builds for fuzzing.☆37Updated 3 weeks ago
- Binary-only fuzzer for WebAssembly (WASI)☆48Updated 6 months ago
- ☆22Updated 7 years ago
- ☆47Updated 4 years ago
- ☆15Updated 4 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆36Updated 2 years ago
- Crowdsourced fuzzing cluster. 🚀☆21Updated 3 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Fuzzer for Wasm and Wasmer☆26Updated 5 years ago
- An extendable and flexible infrastructure for program instrumentation.☆21Updated this week
- ☆29Updated 6 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 11 years ago
- A Dynamic Symbolic Execution (DSE) engine for JavaScript. ExpoSE is highly scalable, compatible with recent JavaScript standards, and sup…☆196Updated last month
- Static Program Analysis for Reliable Trusted Apps☆22Updated 6 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Updated 4 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- A framework for streamlining the capture of PANDA execution traces.☆56Updated 4 years ago
- TRACER Symbolic Execution Tool☆28Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago