eqv / indikaLinks
A blanket execution/min hash semantic hash tool for binary function identification
☆17Updated 9 years ago
Alternatives and similar repositories for indika
Users that are interested in indika are comparing it to the libraries listed below
Sorting:
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆34Updated 7 years ago
- Python concolic execution framework for program analysis☆66Updated 10 years ago
- Python repository containing parsed standard C library function and argument information☆26Updated 6 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆35Updated 4 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- Triton based R2 plugin for concolic execution and total control☆32Updated 6 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- REIL translation library☆36Updated 9 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆18Updated 9 years ago
- A framework for control-flow recovery in binary programs.☆10Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 2 years ago
- Toy binaries to play with -fsanitize=safe-stack/cfi☆9Updated 9 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 9 years ago
- ☆14Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆94Updated 7 years ago
- Lightweight Symbolic Execution Engine☆23Updated 9 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago
- ☆28Updated 2 years ago
- Python wrapper for the Windows CDB Debugger☆19Updated 3 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- ☆63Updated 9 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago