libipt - an Intel(R) Processor Trace decoder library
☆18Apr 7, 2017Updated 8 years ago
Alternatives and similar repositories for processor-trace
Users that are interested in processor-trace are comparing it to the libraries listed below
Sorting:
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Intel Processor Trace package collector for Windows☆18Jun 14, 2020Updated 5 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- This driver implements the Intel Processor Trace functionality in Intel Skylake architecture for Microsoft Windows☆466Apr 17, 2018Updated 7 years ago
- Some POCs or Exploits for vulnerabilities☆12Feb 17, 2019Updated 7 years ago
- saphIR is an Intermediate Representation with amd64 and arm64 backends. Also included: a compiler, an arm64 lifter, an arm64 to amd64 dyn…☆32Feb 4, 2021Updated 5 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- Binary Only Thread Sanitizer☆18Aug 10, 2024Updated last year
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Slow llvm tracing for the masses☆14Feb 22, 2020Updated 6 years ago
- A simple demonstration of the macOS Network Extension☆16May 12, 2021Updated 4 years ago
- Improving AFL by using Intel PT to collect branch information☆292Jul 26, 2019Updated 6 years ago
- The fastest Intel-PT decoder for fuzzing☆378Feb 2, 2024Updated 2 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- A short proof-of-concept how to decrypt ssl traffic WITHOUT the server private TLS certificate☆16Oct 16, 2018Updated 7 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- A small tool to produce a dummy pdb for an executable with symbols at addresses from a file☆40Nov 16, 2017Updated 8 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- ☆41Jun 6, 2021Updated 4 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.☆21Dec 4, 2025Updated 2 months ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- Simple Intel CPU processor tracing on Linux☆354Mar 1, 2023Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆163Aug 31, 2022Updated 3 years ago
- libipt - an Intel(R) Processor Trace decoder library☆705Jan 8, 2026Updated last month
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Mar 11, 2024Updated last year
- ☆18Sep 4, 2023Updated 2 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆323Dec 16, 2021Updated 4 years ago
- ☆185Jan 12, 2023Updated 3 years ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 6 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- 仿WPE拦截Socket☆18Nov 7, 2013Updated 12 years ago