avatartwo / bar18_avatar2Links
Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"
☆18Updated 7 years ago
Alternatives and similar repositories for bar18_avatar2
Users that are interested in bar18_avatar2 are comparing it to the libraries listed below
Sorting:
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- ☆67Updated 5 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- ☆27Updated 4 years ago
- run AFL with pintool☆66Updated 5 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- Examples demonstrating the usage of avatar²☆27Updated 2 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 4 years ago
- AFL, with scripts to support other architectures.☆97Updated 7 years ago
- Cisco MIPS debugger☆62Updated 7 years ago
- ☆163Updated 4 years ago
- ☆53Updated 6 months ago
- ☆54Updated 7 years ago
- ☆23Updated 6 years ago
- ☆64Updated 6 years ago
- ☆50Updated 5 years ago
- Source code of HAL-fuzz☆155Updated 4 years ago
- ☆41Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆60Updated 4 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆58Updated 7 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago
- ☆50Updated 8 years ago
- ☆20Updated 7 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆52Updated last year
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Distributed Fuzzing for afl☆72Updated 10 years ago
- Dynamic security analysis of embedded systems’ firmwares☆83Updated 9 years ago