☆47May 27, 2023Updated 2 years ago
Alternatives and similar repositories for EmTaint
Users that are interested in EmTaint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆96May 4, 2025Updated 10 months ago
- An automated static taint analysis tool for the Lua web framework.☆24Sep 27, 2024Updated last year
- ☆27Dec 29, 2024Updated last year
- ☆31May 28, 2023Updated 2 years ago
- ☆94Mar 31, 2025Updated 11 months ago
- ☆239Jan 14, 2024Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆340Dec 12, 2024Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆91Sep 18, 2025Updated 6 months ago
- ☆73Nov 1, 2023Updated 2 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 10 months ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- ☆66Jun 21, 2024Updated last year
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- ☆10Sep 10, 2022Updated 3 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆17Sep 25, 2022Updated 3 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆101Nov 10, 2025Updated 4 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- A frozen version of angr for the SAILR paper☆16Sep 4, 2024Updated last year
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- ☆32May 1, 2025Updated 10 months ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- 基于angr的污点分析引擎☆41Apr 19, 2019Updated 6 years ago
- Source-binary patch presence test system.☆84Jun 23, 2022Updated 3 years ago
- Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation☆17Jan 28, 2026Updated last month
- A Hybrid Alias Analysis☆19Aug 10, 2023Updated 2 years ago
- SHiFT: Semi-hosted Fuzz Testing for Embedded Applications☆18Dec 10, 2024Updated last year
- ☆17Jan 1, 2021Updated 5 years ago
- WebSVF : Online Learning and Teaching Platform for Code Analysis based on SVF☆18Jan 29, 2026Updated last month
- IDA Hexrays To Joern☆46Nov 7, 2024Updated last year
- ☆23Jun 22, 2024Updated last year
- The Use of Likely Invariants as Feedback for Fuzzers☆94Jan 19, 2022Updated 4 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- ☆20Jan 19, 2026Updated 2 months ago
- DiAne is a smart fuzzer for IoT devices☆42Apr 3, 2024Updated last year