cdisselkoen / pitchforkView external linksLinks
Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)
☆77Sep 23, 2022Updated 3 years ago
Alternatives and similar repositories for pitchfork
Users that are interested in pitchfork are comparing it to the libraries listed below
Sorting:
- Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv☆40Nov 23, 2019Updated 6 years ago
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆156Oct 4, 2021Updated 4 years ago
- A PCode Emulator for Ghidra.☆112Feb 7, 2021Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Dec 11, 2019Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆61Jul 5, 2020Updated 5 years ago
- The Fantastic Beasts Framework is a collection of tools for fuzzing the Android OS.☆69Jun 7, 2019Updated 6 years ago
- Modular And Compositional analysis with KLEE Engine☆117Dec 17, 2019Updated 6 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆61Jan 22, 2021Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆59Mar 27, 2021Updated 4 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 7 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 5 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆736Apr 26, 2025Updated 9 months ago
- Fork of Synacktiv's private Lumina server☆21Feb 22, 2022Updated 3 years ago
- ☆17May 13, 2019Updated 6 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- ☆12Jan 7, 2025Updated last year
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Automatic detection of speculative information flows☆75Jul 14, 2021Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Jul 22, 2020Updated 5 years ago
- Reverse engineering software using a full system simulator☆191Feb 4, 2026Updated last week
- ☆181Nov 25, 2018Updated 7 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- An abstraction layer for constraint solvers.☆326Feb 4, 2026Updated last week
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Feb 5, 2026Updated last week
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- Side-channel Analysis☆19May 17, 2022Updated 3 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 5 years ago
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆608Jun 18, 2023Updated 2 years ago
- ARMv7 architecture plugin☆40Mar 7, 2024Updated last year
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆519Jan 18, 2022Updated 4 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- ☆25Oct 4, 2018Updated 7 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Sep 5, 2017Updated 8 years ago