badnack / angr_taint_engine
angr's exploration technique to perform taint analysis
☆52Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for angr_taint_engine
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- UAF Fuzzing Benchmark☆55Updated 3 years ago
- ☆25Updated last year
- ☆20Updated 2 months ago
- AFLNW: network wrapper for AFL☆45Updated 8 months ago
- Material and examples for a presentation on static binary analysis.☆39Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆74Updated 2 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆78Updated 2 years ago
- Source-binary patch presence test system.☆82Updated 2 years ago
- A data-flow-guided fuzzer☆111Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago
- Run fuzzing experiments in Docker☆30Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆61Updated last year
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- ☆71Updated 6 months ago
- A collection of widely-fuzzed targets☆44Updated 5 years ago
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- ☆76Updated last year
- ☆33Updated last year
- ☆45Updated last year
- Symbolic Execution Over Processor Traces☆116Updated 3 months ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 4 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆64Updated 2 years ago
- ☆67Updated 4 years ago
- ☆26Updated last year
- ☆34Updated 2 years ago
- ☆87Updated 3 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- implementing collafl☆25Updated 4 years ago
- A regression greybox fuzzer aflchurn☆64Updated 2 years ago