jrjr / taint-paradeLinks
taint tracer/analysis pintool
☆25Updated 11 years ago
Alternatives and similar repositories for taint-parade
Users that are interested in taint-parade are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- S2E plugins library☆17Updated 5 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆43Updated 5 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Updated 10 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 9 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- A "general-purpose" tracing tool☆39Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- Immunity Debugger Taint Tracer☆20Updated 12 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 11 years ago
- ☆88Updated 10 years ago
- Code coverage analysis tools for the PIN Toolkit☆60Updated 12 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 10 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 9 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆96Updated 13 years ago
- ☆15Updated 10 years ago
- ☆27Updated last year
- Automatically exported from code.google.com/p/mynav☆30Updated 10 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Updated 11 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- libdft for win☆51Updated 12 years ago
- Crappy Win32k syscall fuzzer☆13Updated 10 years ago
- ☆19Updated 5 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- Basic Block Trace: DynamoRIO client☆27Updated 3 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆28Updated 8 years ago
- ☆25Updated 6 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆29Updated 10 years ago
- My collection of IDAPython scripts.☆40Updated 9 years ago