felixgr / kerckhoffsLinks
Automatic Identification of Cryptographic Primitives in Software
☆31Updated 10 years ago
Alternatives and similar repositories for kerckhoffs
Users that are interested in kerckhoffs are comparing it to the libraries listed below
Sorting:
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- ☆63Updated 6 years ago
- Python concolic execution framework for program analysis☆67Updated 10 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- IDA plugin for software complexity metrics assessment☆60Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆216Updated last week
- Distributed Fuzzing for afl☆71Updated 9 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated 3 weeks ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- Utilities for generating dynamic traces☆92Updated 3 months ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Updated 8 years ago
- ☆66Updated 4 years ago
- ☆43Updated 3 years ago
- A linux system call fuzzer using TriforceAFL☆177Updated last year
- Classes with architecture-specific information useful to other projects.☆94Updated this week
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Some helper scripts to set up an environment for angr development.☆117Updated last week
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆77Updated 5 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆94Updated 7 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 7 years ago
- ☆55Updated 5 years ago
- A patched version of VEX to work with PyVEX.☆110Updated 4 months ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Deprecated repo for PANDA 1.0 – see PANDA 2.0 repository☆106Updated 8 years ago
- ☆251Updated 5 years ago