kudu-dynamics / blaze-platform
A framework for program analysis with a focus on modeling programmer assumptions, context- and path-sensitive analyses, and type checking.
☆49Updated 2 months ago
Alternatives and similar repositories for blaze-platform:
Users that are interested in blaze-platform are comparing it to the libraries listed below
- ☆12Updated 2 years ago
- Program analysis tools developed at Draper on the CBAT project.☆103Updated last year
- An approximate solver for concolic execution☆18Updated 3 years ago
- Open source binary analysis tools.☆218Updated last week
- BAP Plugins Repository☆57Updated 4 years ago
- A collection of ready to use binary analysis tools☆56Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- Utilities for generating dynamic traces☆90Updated this week
- KLEE / CSE Project☆44Updated 4 years ago
- The BAP tutorial☆73Updated 2 years ago
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing☆34Updated last year
- Symbolic Execution Over Processor Traces☆120Updated 7 months ago
- Scalable Validator for Binary Lifters☆55Updated 4 years ago
- ☆24Updated 2 years ago
- ☆37Updated 2 years ago
- ☆13Updated 6 months ago
- A collection of extensions to angr to handle new platforms☆67Updated this week
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated 2 months ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- ☆69Updated last year
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- AIL: The angr Intermediate Language.☆32Updated this week
- ☆17Updated 2 years ago
- An opinionated tool to create amazing presentations☆36Updated 2 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆127Updated 3 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆89Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆101Updated 2 years ago