☆239Jan 14, 2024Updated 2 years ago
Alternatives and similar repositories for arbiter
Users that are interested in arbiter are comparing it to the libraries listed below
Sorting:
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- A collection of resources/tools and analyses for the angr binary analysis framework.☆188Jul 28, 2022Updated 3 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- SymQEMU: Compilation-based symbolic execution for binaries☆369May 5, 2025Updated 10 months ago
- A data-flow-guided fuzzer☆124Aug 19, 2023Updated 2 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- angr's exploration technique to perform taint analysis☆65Mar 26, 2020Updated 5 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆95Oct 28, 2021Updated 4 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆121Feb 25, 2026Updated last week
- ☆47May 27, 2023Updated 2 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Oct 21, 2023Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆93Jan 19, 2022Updated 4 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆162Aug 31, 2022Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- A curated list of awesome directed fuzzing research papers☆584Dec 27, 2025Updated 2 months ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆66Dec 14, 2021Updated 4 years ago
- ☆189Mar 21, 2025Updated 11 months ago
- Get results of binaryai.cn using our SDK☆505Feb 9, 2026Updated 3 weeks ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Jul 14, 2022Updated 3 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆236Mar 14, 2022Updated 3 years ago
- ☆31May 28, 2023Updated 2 years ago
- An awesome & curated list of binary code similarity papers☆597Jan 5, 2026Updated 2 months ago
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆194Oct 29, 2022Updated 3 years ago
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆835Dec 25, 2025Updated 2 months ago
- SymCC: efficient compiler-based symbolic execution☆856May 12, 2025Updated 9 months ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago