bitpeach / Protocol-Informatics
“Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "PI" is short for “Protocol Informatics”, which introduces local and global sequence alignment algorithms. The PI project is famous in network protocol reverse engineering based on network trace. I am not the au…
☆50Updated 7 years ago
Alternatives and similar repositories for Protocol-Informatics:
Users that are interested in Protocol-Informatics are comparing it to the libraries listed below
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆54Updated 10 months ago
- List of (automatic) protocol reverse engineering tools for network protocols☆159Updated 11 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆69Updated 9 months ago
- Patches to the Protocol Informatics project to make it work with a numpy.☆20Updated 12 years ago
- ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing☆234Updated 8 months ago
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆164Updated last year
- modbus fuzzer based on boofuzz framework.!! Cool☆30Updated 7 years ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆32Updated 4 years ago
- Protocol Learning and Stateful Fuzzing☆351Updated 2 years ago
- ☆52Updated 6 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆103Updated 6 years ago
- ☆12Updated 3 years ago
- A protocol reverse engineering tool for industrial binary protocol based on pin tool☆17Updated 4 years ago
- ☆65Updated 4 years ago
- implementing collafl☆25Updated 5 years ago
- ☆19Updated 3 years ago
- Peach Fuzzer PIT Files☆22Updated 11 years ago
- Protocol state machine learner and fuzzer for DTLS servers and clients☆37Updated last week
- Re-implementation of the protocol reverse engineering approach FieldHunter☆14Updated 2 years ago
- IoT Security Reading List☆62Updated 5 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆136Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆405Updated 3 years ago
- Source-binary patch presence test system.☆83Updated 2 years ago
- An Automated Vulnerability Detection System☆59Updated 8 years ago
- Reverse engineering tool using bioinformatics sequence alignment algorithms☆26Updated 4 years ago
- DiAne is a smart fuzzer for IoT devices☆39Updated last year
- ☆92Updated last year
- ☆32Updated 2 years ago
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆450Updated last year
- ☆27Updated last year