mdulin2 / mangle
Repository for dealing with Malloc mangling functions
☆10Updated 4 years ago
Related projects: ⓘ
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Updated 6 years ago
- A library for patching ELFs☆52Updated 3 years ago
- KLEE Symbolic Execution Engine☆61Updated 4 years ago
- ROP Benchmark is a tool to compare ROP compilers☆38Updated last year
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 5 years ago
- Flex 'em lexers☆38Updated 3 years ago
- ☆13Updated 3 years ago
- run AFL with dynamorio☆35Updated 4 years ago
- run AFL with pintool☆66Updated 4 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆34Updated 2 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆22Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆31Updated 4 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 8 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆57Updated 3 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆72Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 3 years ago
- tool for multi-execution jump coverage introspection☆62Updated last year
- Signedness-Agnostic Strided-Interval☆34Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆67Updated 3 years ago
- ☆94Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 3 years ago
- Build your emulation environment as needed☆64Updated 3 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 6 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆25Updated 3 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- ☆33Updated 3 years ago