cdisselkoen / pitchforkLinks
Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)
☆75Updated 2 years ago
Alternatives and similar repositories for pitchfork
Users that are interested in pitchfork are comparing it to the libraries listed below
Sorting:
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Rewriting functions in compiled binaries using McSema☆90Updated 6 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- ☆63Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 2 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆102Updated last year
- ☆96Updated 6 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆218Updated 2 months ago
- ☆65Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- ☆132Updated 5 years ago
- CRETE under development☆59Updated 5 years ago
- Tool for detecting error handling bugs☆23Updated 9 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Doublethink challenge from DEF CON 2018☆23Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago
- ☆82Updated 3 weeks ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 8 years ago
- ☆44Updated 3 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆95Updated last week
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆36Updated 5 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- The Jakstab static analysis platform for binaries☆160Updated 5 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago