badnack / angr_taint_engineLinks
angr's exploration technique to perform taint analysis
☆63Updated 5 years ago
Alternatives and similar repositories for angr_taint_engine
Users that are interested in angr_taint_engine are comparing it to the libraries listed below
Sorting:
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- Material and examples for a presentation on static binary analysis.☆43Updated 4 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆88Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆82Updated 3 years ago
- ☆78Updated last year
- ☆34Updated 2 years ago
- ☆57Updated last year
- A data-flow-guided fuzzer☆120Updated last year
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- ☆72Updated last month
- ☆88Updated 2 months ago
- Source-binary patch presence test system.☆84Updated 3 years ago
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- ☆34Updated 3 years ago
- A collection of widely-fuzzed targets☆46Updated 5 years ago
- ☆9Updated last year
- ☆29Updated 2 years ago
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- ☆24Updated 9 months ago
- ☆55Updated last year
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆62Updated last year
- ☆92Updated last year
- ☆68Updated 11 months ago
- A DOM fuzzer.☆79Updated 3 years ago
- Run fuzzing experiments in Docker☆31Updated 4 years ago
- a blackbox network fuzzer for IoT devices☆53Updated 9 months ago
- AFLNW: network wrapper for AFL☆47Updated last year
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆65Updated 3 years ago