badnack / angr_taint_engineLinks
angr's exploration technique to perform taint analysis
☆62Updated 5 years ago
Alternatives and similar repositories for angr_taint_engine
Users that are interested in angr_taint_engine are comparing it to the libraries listed below
Sorting:
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- ☆34Updated 2 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆86Updated 2 years ago
- A data-flow-guided fuzzer☆119Updated last year
- ☆56Updated last year
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- Material and examples for a presentation on static binary analysis.☆43Updated 4 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆61Updated last year
- AFLNW: network wrapper for AFL☆47Updated last year
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- ☆71Updated 3 weeks ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆82Updated 3 years ago
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- ☆29Updated 2 years ago
- ☆88Updated 2 months ago
- Perry: automated peripheral modeling with symbolic execution☆27Updated last year
- ☆34Updated last year
- ☆9Updated last year
- Source-binary patch presence test system.☆83Updated 2 years ago
- ☆92Updated last year
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- ☆78Updated last year
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Updated 2 years ago
- implementing collafl☆25Updated 5 years ago
- ☆34Updated 3 years ago
- ☆26Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- ☆68Updated 11 months ago
- A regression greybox fuzzer aflchurn☆66Updated 3 years ago