junxzm1990 / x86-sok
☆132Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for x86-sok
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆238Updated 2 years ago
- Symbolic Execution Over Processor Traces☆116Updated 3 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆151Updated 2 years ago
- A LLVM Sanitizer for Symbolic Tracing☆208Updated 2 months ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆134Updated 11 months ago
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆195Updated 3 years ago
- source code for savior fuzzer☆126Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆58Updated 2 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆135Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆83Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆115Updated 2 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆176Updated 2 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆110Updated 3 years ago
- A data-flow-guided fuzzer☆111Updated last year
- Source code of ASAN--☆91Updated 5 months ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆211Updated 4 years ago
- Produce code coverage results with gcov from afl-fuzz test cases☆69Updated 5 months ago
- Utilities for generating dynamic traces☆88Updated 2 years ago
- angr's exploration technique to perform taint analysis☆52Updated 4 years ago
- An awesome & curated list of binary rewriting papers☆220Updated 2 years ago
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆172Updated 7 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 6 months ago
- A set of programs used for benchmarking the strength of obfuscation☆83Updated 6 years ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆202Updated 3 years ago
- ☆218Updated 10 months ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆78Updated this week
- ☆67Updated 4 years ago