junxzm1990 / x86-sokLinks
☆144Updated 7 months ago
Alternatives and similar repositories for x86-sok
Users that are interested in x86-sok are comparing it to the libraries listed below
Sorting:
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆258Updated 4 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- A LLVM Sanitizer for Symbolic Tracing☆221Updated last week
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆221Updated 5 years ago
- angr's exploration technique to perform taint analysis☆63Updated 5 years ago
- ☆226Updated last year
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- An awesome & curated list of binary rewriting papers☆240Updated 3 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated last month
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆213Updated 4 years ago
- A data-flow-guided fuzzer☆120Updated last year
- SymQEMU: Compilation-based symbolic execution for binaries☆347Updated last month
- We hinder fuzzing☆68Updated 3 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆154Updated last year
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆194Updated this week
- A patched version of VEX to work with PyVEX.☆109Updated 4 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆178Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- A grammar-based custom mutator for AFL++☆253Updated 11 months ago
- A set of programs used for benchmarking the strength of obfuscation☆90Updated 7 years ago