jkinder / jakstabLinks
The Jakstab static analysis platform for binaries
☆160Updated 5 years ago
Alternatives and similar repositories for jakstab
Users that are interested in jakstab are comparing it to the libraries listed below
Sorting:
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated 2 months ago
- FuzzBALL: Vine-based Binary Symbolic Execution☆216Updated this week
- Utilities for generating dynamic traces☆93Updated 4 months ago
- A patched version of VEX to work with PyVEX.☆111Updated last week
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆217Updated last month
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- Infrastructure for Reassembleable Disassembling and Transformation☆205Updated 3 weeks ago
- ☆63Updated 6 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆62Updated 2 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆135Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- CRETE under development☆59Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- ☆124Updated 4 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- ☆132Updated 5 years ago
- Classes with architecture-specific information useful to other projects.☆95Updated last week
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆65Updated 4 years ago
- SymGDB - symbolic execution plugin for gdb☆217Updated 7 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆138Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 4 years ago
- Some helper scripts to set up an environment for angr development.☆117Updated 2 weeks ago
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆260Updated 2 months ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 4 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago