felixgr / kerckhoffs
Automatic Identification of Cryptographic Primitives in Software
☆30Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for kerckhoffs
- Utilities for generating dynamic traces☆88Updated 2 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago
- Classes with architecture-specific information useful to other projects.☆87Updated this week
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆25Updated 8 years ago
- Z3 Symbolic Execution python☆28Updated 6 years ago
- Dynamic security analysis of embedded systems’ firmwares☆80Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆58Updated 2 years ago
- Python concolic execution framework for program analysis☆65Updated 10 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- ☆56Updated 4 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆71Updated 2 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆72Updated 7 years ago
- ☆43Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 7 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 4 years ago
- ☆47Updated 3 years ago
- Some helper scripts to set up an environment for angr development.☆117Updated last month
- A repository with binaries for angr tests and examples.☆56Updated this week
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- A pip wrapper around AFL.☆84Updated 3 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆93Updated 3 months ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- A patched version of VEX to work with PyVEX.☆105Updated 2 months ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆98Updated 4 years ago