dvm-system / tsar
TSAR (Traits Static AnalyzeR)
☆14Updated 10 months ago
Alternatives and similar repositories for tsar:
Users that are interested in tsar are comparing it to the libraries listed below
- ☆15Updated 6 years ago
- Program synthesis tools and utilities for LLVM.☆20Updated last year
- PIN-based Fault-Injector is a fault injector based on the Intel PIN tool. For more information, please refer to the following paper:☆16Updated 6 years ago
- Tools that run inside the guest☆12Updated 5 years ago
- radare2 cLEMENCy plugins☆23Updated 7 years ago
- 64 pack☆7Updated 8 years ago
- Lightweight WINAPI tracing with Pin☆26Updated 5 years ago
- A library for dynamic binary rewriting☆57Updated 4 years ago
- Basic Block Trace: DynamoRIO client☆27Updated 3 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- Dynamic Control Flow Recovery☆24Updated 6 years ago
- Simple Library calls tracer☆22Updated 7 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆19Updated 2 years ago
- A C++ cross-platform log library.☆13Updated 2 years ago
- TracerX Symbolic Virtual Machine☆33Updated last week
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Securing Data Analytics on Intel SGX using Randomization☆12Updated 7 years ago
- ☆12Updated 7 years ago
- ☆16Updated 10 years ago
- It is a tool to analyze the pattern of memory mapped file I/O using Intel pin.☆19Updated 6 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆19Updated 6 years ago
- Improvised json-based configurable Windows sandbox☆11Updated 4 years ago
- ☆14Updated 7 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- A testcase generation tool for Persistent Memory Programs.☆15Updated 3 years ago
- A collection of code based on LLVM/Clang compilation libraries and tools☆39Updated 5 years ago
- ☆12Updated 8 years ago
- ☆13Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- A tool that allows you to assemble and emulate assembly in multiple archs for learning purposes☆13Updated 6 years ago