brainsmoke / minemuLinks
Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )
☆42Updated 5 years ago
Alternatives and similar repositories for minemu
Users that are interested in minemu are comparing it to the libraries listed below
Sorting:
- CRETE under development☆60Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- ☆64Updated 4 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- ☆26Updated 10 years ago
- ☆55Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 9 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- ☆64Updated 6 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- A "general-purpose" tracing tool☆39Updated 10 years ago
- A patched version of VEX to work with PyVEX.☆112Updated 2 months ago
- The Jakstab static analysis platform for binaries☆161Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- Python concolic execution framework for program analysis☆68Updated 11 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 7 years ago
- Utilities for generating dynamic traces☆93Updated 8 months ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆96Updated 6 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 3 years ago