mechaphish / compilerexLinks
POV templates and compilation support for CGC binaries.
☆10Updated 3 years ago
Alternatives and similar repositories for compilerex
Users that are interested in compilerex are comparing it to the libraries listed below
Sorting:
- QEMU modified to run CGC binaries.☆13Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆94Updated 7 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆18Updated 8 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- ☆63Updated 6 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆14Updated 8 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- OSS-Fuzz - integrated with AFLGo for Patch Testing☆35Updated 7 years ago
- Utilities for generating dynamic traces☆92Updated 3 months ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- ☆24Updated 6 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆80Updated 6 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- run AFL with pintool☆66Updated 5 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆77Updated 5 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- ☆72Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- Distributed Fuzzing for afl☆71Updated 9 years ago
- CRAX: software CRash analysis for Automatic eXploit generation☆49Updated 9 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Official repository for ASAP: High System-code Security at Low Overhead☆25Updated 9 years ago
- ☆53Updated 6 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago