badnack / angr_taint_engineLinks
angr's exploration technique to perform taint analysis
☆63Updated 5 years ago
Alternatives and similar repositories for angr_taint_engine
Users that are interested in angr_taint_engine are comparing it to the libraries listed below
Sorting:
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆88Updated 3 years ago
- ☆92Updated last year
- A data-flow-guided fuzzer☆122Updated last year
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- ☆226Updated last year
- ☆36Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆83Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆44Updated 4 years ago
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- ☆78Updated last year
- ☆24Updated 10 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- ☆74Updated 2 months ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆63Updated last year
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- ☆59Updated last year
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- A DOM fuzzer.☆79Updated 3 years ago
- ☆72Updated 2 years ago
- ☆55Updated last year
- a blackbox network fuzzer for IoT devices☆53Updated 10 months ago
- AFLNW: network wrapper for AFL☆47Updated last year
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆139Updated last year
- Source-binary patch presence test system.☆84Updated 3 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- ☆36Updated 4 years ago
- ☆77Updated 2 years ago