dvm-system / tsarLinks
TSAR (Traits Static AnalyzeR)
☆15Updated last year
Alternatives and similar repositories for tsar
Users that are interested in tsar are comparing it to the libraries listed below
Sorting:
- TracerX Symbolic Virtual Machine☆31Updated last month
- It is a tool to analyze the pattern of memory mapped file I/O using Intel pin.☆19Updated 7 years ago
- radare2 cLEMENCy plugins☆24Updated 8 years ago
- expansion of afl-unicorn using c++☆28Updated 6 years ago
- Simple Library calls tracer☆22Updated 7 years ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆27Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Updated 4 years ago
- ☆14Updated 7 years ago
- ☆10Updated 7 years ago
- A library for dynamic binary rewriting☆58Updated 4 years ago
- Dynamic Control Flow Recovery☆25Updated 7 years ago
- Assorted pintools☆30Updated 5 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Updated 2 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 10 years ago
- Security introduction book☆23Updated 9 years ago
- Tools that run inside the guest☆11Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 8 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 12 years ago
- Improvised json-based configurable Windows sandbox☆11Updated 5 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Updated 7 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- LLVM DSA fork for SeaHorn☆21Updated 6 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Updated 2 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆21Updated 2 years ago
- ☆12Updated 7 years ago
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 6 years ago