brainsmoke / minemuLinks
Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )
☆42Updated 5 years ago
Alternatives and similar repositories for minemu
Users that are interested in minemu are comparing it to the libraries listed below
Sorting:
- CRETE under development☆60Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- ☆64Updated 4 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- ☆64Updated 6 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 8 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 9 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆55Updated 5 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- ☆96Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 5 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago
- Utilities for generating dynamic traces☆93Updated 8 months ago
- ☆55Updated 3 years ago
- ☆26Updated 10 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks