cdisselkoen / pitchforkLinks
Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)
☆76Updated 3 years ago
Alternatives and similar repositories for pitchfork
Users that are interested in pitchfork are comparing it to the libraries listed below
Sorting:
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- ☆64Updated 4 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- ☆64Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Tool for detecting error handling bugs☆23Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- ☆96Updated 6 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆95Updated 2 months ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆103Updated last year
- Uncovering Class Hierarchies in C++ Programs☆127Updated 3 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆222Updated 5 months ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 8 years ago
- ☆45Updated 3 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- CRETE under development☆60Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆61Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 5 years ago
- Design documents related to the decompilation pipeline.☆29Updated 3 months ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- run AFL with pintool☆66Updated 5 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆107Updated 7 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- The Jakstab static analysis platform for binaries☆161Updated 6 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆37Updated 5 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago