dvm-system / tsarLinks
TSAR (Traits Static AnalyzeR)
☆15Updated last year
Alternatives and similar repositories for tsar
Users that are interested in tsar are comparing it to the libraries listed below
Sorting:
- radare2 cLEMENCy plugins☆24Updated 8 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Updated 2 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Updated 4 years ago
- Simple Library calls tracer☆22Updated 7 years ago
- TracerX Symbolic Virtual Machine☆32Updated 3 months ago
- LLVM dataflow analysis framework; Reaching Definition Analysis; Liveness Analysis, May-point-to Definition Analysis ; inter-procedural m…☆26Updated 5 years ago
- It is a tool to analyze the pattern of memory mapped file I/O using Intel pin.☆19Updated 7 years ago
- A library for dynamic binary rewriting☆58Updated 4 years ago
- expansion of afl-unicorn using c++☆28Updated 6 years ago
- Dynamic Control Flow Recovery☆25Updated 7 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Updated 7 years ago
- Basic Block Trace: DynamoRIO client☆29Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 7 years ago
- Assorted pintools☆30Updated 5 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Updated 5 years ago
- Lightweight WINAPI tracing with Pin☆27Updated 6 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 8 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- Clang AST viewer☆68Updated 8 years ago
- ☆14Updated 7 years ago
- Network monitor for Linux☆13Updated 6 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Updated 5 years ago
- Security introduction book☆23Updated 10 years ago
- An example LLVM pass which can run automatically in clang.☆38Updated 10 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆34Updated 3 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- source code of paper "Mapping to Bits: Efficiently Detecting Type Confusion Errors"☆14Updated 7 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 7 years ago