eqv / indikaLinks
A blanket execution/min hash semantic hash tool for binary function identification
☆17Updated 9 years ago
Alternatives and similar repositories for indika
Users that are interested in indika are comparing it to the libraries listed below
Sorting:
- Python concolic execution framework for program analysis☆68Updated 11 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 9 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 8 years ago
- QTrace, a "zero knowledge" system call tracer☆54Updated 10 years ago
- A "general-purpose" tracing tool☆39Updated 10 years ago
- Python repository containing parsed standard C library function and argument information☆28Updated 7 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- REIL translation library☆36Updated 9 years ago
- Unofficial mirror of☆11Updated 7 years ago
- ☆64Updated 10 years ago
- ☆28Updated 3 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 12 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Malamute is a fuzzing toolkit initially developed to aid with regression-test based fuzzing of language interpreters☆28Updated 9 years ago
- ☆14Updated 9 years ago
- TaintAll, a taint analysis and concolic execution tool☆32Updated 8 years ago
- Python wrapper for the Windows CDB Debugger☆20Updated 3 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 10 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆42Updated 5 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Updated 10 years ago