mlaurenzano / PEBILView external linksLinks
Fast static binary instrumentation for linux/x86
☆83Mar 14, 2017Updated 8 years ago
Alternatives and similar repositories for PEBIL
Users that are interested in PEBIL are comparing it to the libraries listed below
Sorting:
- DyninstAPI: Tools for binary instrumentation, analysis, and modification.☆818Updated this week
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 7 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Jun 18, 2020Updated 5 years ago
- Fast Binary Translator for the Kernel☆28Sep 23, 2013Updated 12 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- iOS Kernel Decompressor☆90May 12, 2020Updated 5 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆590Jan 10, 2019Updated 7 years ago
- xnu_gym is a pongoOS module that patches XNU to reintroduce previously known and patched vulnerabilities. This is an easy way to practice…☆57Jun 17, 2021Updated 4 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Jul 14, 2022Updated 3 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 2 months ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- a grammar based feedback fuzzer☆165Jul 1, 2023Updated 2 years ago
- A Kernel fuzzer focusing on race bugs☆378Jul 10, 2019Updated 6 years ago
- Improving AFL by using Intel PT to collect branch information☆292Jul 26, 2019Updated 6 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- A low-overhead dynamic binary instrumentation and modification tool for ARM (both AArch32 and AArch64 support) and RISC-V (RV64GC).☆392Jan 21, 2025Updated last year
- ☆16Jul 30, 2020Updated 5 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- ☆50Mar 21, 2019Updated 6 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- CVE-2020-27950 exploit☆34Dec 1, 2020Updated 5 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- Mirror my talk materials☆47Oct 16, 2025Updated 3 months ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 5 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- ☆30May 23, 2017Updated 8 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- This is an OllyDbg plugin which will help you to import map files exported by IDA, Dede, IDR, Microsoft and Borland linkers.☆22Aug 12, 2015Updated 10 years ago