junxzm1990 / x86-sokLinks
☆144Updated 8 months ago
Alternatives and similar repositories for x86-sok
Users that are interested in x86-sok are comparing it to the libraries listed below
Sorting:
- Symbolic Execution Over Processor Traces☆121Updated 11 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆260Updated 4 months ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- A LLVM Sanitizer for Symbolic Tracing☆223Updated last week
- An awesome & curated list of binary rewriting papers☆245Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆223Updated 5 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆203Updated 3 years ago
- A data-flow-guided fuzzer☆122Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆102Updated 2 months ago
- ☆85Updated 8 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆155Updated last year
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆187Updated last year
- ☆226Updated last year
- SymQEMU: Compilation-based symbolic execution for binaries☆349Updated 2 months ago
- Source code of ASAN--☆95Updated last year
- An unofficial implementation of asm2vec as a standalone python package☆165Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated last month
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆113Updated 7 months ago
- angr's exploration technique to perform taint analysis☆63Updated 5 years ago
- BinTuner☆62Updated 2 years ago
- A set of programs used for benchmarking the strength of obfuscation☆90Updated 7 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 5 months ago
- source code for savior fuzzer☆127Updated 4 years ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆214Updated 4 years ago
- afl/afl++ with a hierarchical seed scheduler☆56Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year