carter-yagemann / barnum-tracerView external linksLinks
The PT tracing portion of Barnum.
☆11Feb 8, 2019Updated 7 years ago
Alternatives and similar repositories for barnum-tracer
Users that are interested in barnum-tracer are comparing it to the libraries listed below
Sorting:
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13May 12, 2025Updated 9 months ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- Fuzz-introspector has moved (but is actively maintained) - please follow the project here https://github.com/ossf/fuzz-introspector☆14Dec 3, 2021Updated 4 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- A gameclient hooking framework to aid debuging☆16Nov 27, 2019Updated 6 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 6 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- ☆15Oct 20, 2019Updated 6 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- ☆17Mar 2, 2018Updated 7 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- Symbolic Execution Over Processor Traces☆126Aug 14, 2024Updated last year
- ☆38Feb 6, 2021Updated 5 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 4 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- FUTAG (FUzzing Target Automated Generator) - автоматический генератор фаззинг-оберток для библиотек☆56Oct 17, 2025Updated 4 months ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Forked patchker from patchkit to be easier to use and make code easier to read☆27Sep 30, 2020Updated 5 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- ☆25Feb 21, 2019Updated 6 years ago
- ☆27Apr 27, 2022Updated 3 years ago
- Build your emulation environment as needed☆66Apr 14, 2021Updated 4 years ago