cdisselkoen / pitchfork
Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)
☆74Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for pitchfork
- KLEE Symbolic Execution Engine☆61Updated 5 years ago
- ☆63Updated 5 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆128Updated 2 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆99Updated 7 months ago
- ☆95Updated 5 years ago
- ☆127Updated 5 years ago
- Timeless debugging with symbolic execution and processor trace☆74Updated 3 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆110Updated 3 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆93Updated 3 months ago
- Rewriting functions in compiled binaries using McSema☆87Updated 5 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆36Updated 4 years ago
- ☆63Updated 3 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆212Updated last month
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Constraint solver based on coverage-guided fuzzing☆239Updated 11 months ago
- Uncovering Class Hierarchies in C++ Programs☆123Updated 2 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- Modular And Compositional analysis with KLEE Engine☆113Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆135Updated 3 years ago
- ☆110Updated 10 years ago
- A framework for instrumenting build tools☆83Updated 3 weeks ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- a grammar based feedback fuzzer☆163Updated last year
- ☆80Updated 2 months ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆104Updated 6 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago