junxzm1990 / x86-sokLinks
☆144Updated 7 months ago
Alternatives and similar repositories for x86-sok
Users that are interested in x86-sok are comparing it to the libraries listed below
Sorting:
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- Symbolic Execution Over Processor Traces☆121Updated 9 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆257Updated 3 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆202Updated 3 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆219Updated 4 years ago
- A LLVM Sanitizer for Symbolic Tracing☆221Updated this week
- A data-flow-guided fuzzer☆119Updated last year
- angr's exploration technique to perform taint analysis☆62Updated 5 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- An awesome & curated list of binary rewriting papers☆238Updated 3 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- ☆226Updated last year
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆346Updated 3 weeks ago
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆177Updated last year
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆112Updated 6 months ago
- Utilities for generating dynamic traces☆92Updated 2 months ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- A set of programs used for benchmarking the strength of obfuscation☆87Updated 7 years ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆213Updated 4 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated 3 weeks ago
- fuzzing + concolic = fuzzolic :)☆121Updated last week
- Source code of HAL-fuzz☆149Updated 4 years ago
- ☆66Updated 5 years ago
- A patched version of VEX to work with PyVEX.☆108Updated 3 months ago