michaekang / android_s2e
Run android with S2E
☆32Updated 9 years ago
Related projects: ⓘ
- Symbolic Execution of Android Framework☆14Updated 7 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆45Updated 10 years ago
- Fuzzing framework for third part library of android system☆21Updated 7 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 6 years ago
- ☆41Updated 6 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆45Updated 7 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- ☆66Updated 4 years ago
- ☆44Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 5 years ago
- A dynamic information flow tracing system for Android☆53Updated 3 years ago
- ☆50Updated 5 years ago
- Use Intel Pin tools to analysis binary.☆35Updated 9 years ago
- ☆16Updated 6 years ago
- blog☆16Updated 4 years ago
- AFL fuzzing coverage CFG visualization☆30Updated 6 years ago
- cve2014-3153 exploit for ubuntu x86☆17Updated 9 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆79Updated 7 years ago
- framework for fuzzing various open source tools☆18Updated 9 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆29Updated 5 years ago
- Implementation of Taint Tracking in LLVM compiler.☆10Updated 11 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Updated 8 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 7 years ago
- Re-randomizing the memory layout of a process at runtime☆21Updated 8 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆98Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆34Updated 5 years ago
- ☆66Updated 4 years ago
- ☆56Updated 4 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- code emulator base on unicorn engine☆50Updated 6 years ago