mechaphish / compilerexLinks
POV templates and compilation support for CGC binaries.
☆10Updated 3 years ago
Alternatives and similar repositories for compilerex
Users that are interested in compilerex are comparing it to the libraries listed below
Sorting:
- QEMU modified to run CGC binaries.☆13Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Utilities for generating dynamic traces☆93Updated 4 months ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆80Updated 6 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆62Updated 2 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆25Updated 9 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆77Updated 5 years ago
- ☆55Updated 5 years ago
- ☆55Updated 3 years ago
- ☆63Updated 6 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- OSS-Fuzz - integrated with AFLGo for Patch Testing☆35Updated 7 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆82Updated last year
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- ☆53Updated 7 years ago
- ☆96Updated 6 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated last month