junxzm1990 / x86-sokLinks
☆144Updated last year
Alternatives and similar repositories for x86-sok
Users that are interested in x86-sok are comparing it to the libraries listed below
Sorting:
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆265Updated 9 months ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆160Updated 3 years ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆206Updated 4 years ago
- A LLVM Sanitizer for Symbolic Tracing☆227Updated 5 months ago
- An awesome & curated list of binary rewriting papers☆256Updated 3 years ago
- An unofficial implementation of asm2vec as a standalone python package☆172Updated 4 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆230Updated 5 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆115Updated 2 months ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆169Updated 2 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆178Updated 3 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆365Updated 7 months ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting☆190Updated 2 years ago
- ☆85Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- A set of programs used for benchmarking the strength of obfuscation☆91Updated 7 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆64Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 7 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 10 months ago
- source code for savior fuzzer☆127Updated 5 years ago
- Recent symbolic execution papers and tools.☆182Updated 7 months ago
- fuzzing + concolic = fuzzolic :)☆127Updated last month
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆117Updated last year
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆139Updated 4 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year