carter-yagemann / ARCUSView external linksLinks
Symbolic Execution Over Processor Traces
☆126Aug 14, 2024Updated last year
Alternatives and similar repositories for ARCUS
Users that are interested in ARCUS are comparing it to the libraries listed below
Sorting:
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆163Aug 31, 2022Updated 3 years ago
- A data-flow-guided fuzzer☆124Aug 19, 2023Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Jan 19, 2022Updated 4 years ago
- ☆45Apr 12, 2022Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- fuzzing + concolic = fuzzolic :)☆127Nov 6, 2025Updated 3 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆267Feb 21, 2025Updated 11 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆370May 5, 2025Updated 9 months ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Nov 14, 2022Updated 3 years ago
- A LLVM Sanitizer for Symbolic Tracing☆234Feb 7, 2026Updated last week
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago
- ☆25Oct 4, 2018Updated 7 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆588Apr 8, 2025Updated 10 months ago
- The fastest Intel-PT decoder for fuzzing☆377Feb 2, 2024Updated 2 years ago
- An awesome & curated list of binary rewriting papers☆261Apr 4, 2022Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124May 18, 2025Updated 8 months ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- ☆238Jan 14, 2024Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69May 31, 2024Updated last year
- source code for savior fuzzer☆127Oct 1, 2020Updated 5 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆91Mar 26, 2025Updated 10 months ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 4 years ago
- Hydra: an Extensible Fuzzing Framework for Finding Semantic Bugs in File Systems☆173Aug 8, 2022Updated 3 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆66Dec 14, 2021Updated 4 years ago
- A ground-truth fuzzing benchmark suite based on real programs with real bugs.☆334Jan 11, 2026Updated last month
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Source code of HAL-fuzz☆157Feb 4, 2021Updated 5 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Nov 5, 2021Updated 4 years ago
- Program analysis tools developed at Draper on the CBAT project.☆106Apr 13, 2023Updated 2 years ago