badnack / angr_taint_engineLinks
angr's exploration technique to perform taint analysis
☆65Updated 5 years ago
Alternatives and similar repositories for angr_taint_engine
Users that are interested in angr_taint_engine are comparing it to the libraries listed below
Sorting:
- Material and examples for a presentation on static binary analysis.☆45Updated 4 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆45Updated 2 years ago
- ☆233Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆92Updated 3 years ago
- ☆86Updated 5 months ago
- A data-flow-guided fuzzer☆123Updated 2 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆205Updated 3 years ago
- ☆92Updated 6 months ago
- ☆42Updated 2 years ago
- ☆26Updated last year
- ☆94Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90Updated 3 years ago
- UAF Fuzzing Benchmark☆57Updated 4 years ago
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- ☆64Updated last year
- ☆30Updated 2 years ago
- Symbolic Execution Over Processor Traces☆123Updated last year