mrphrazer / kadabraLinks
A blanked execution framework based on the Unicorn engine
☆19Updated 8 years ago
Alternatives and similar repositories for kadabra
Users that are interested in kadabra are comparing it to the libraries listed below
Sorting:
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 9 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆41Updated 5 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 10 years ago
- ☆44Updated 3 years ago
- Assorted pintools☆30Updated 5 years ago
- A framework for control-flow recovery in binary programs.☆10Updated 7 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Updated 5 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 8 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- CRETE under development☆59Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Immunity Debugger Taint Tracer☆20Updated 12 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Updated 3 years ago
- ☆64Updated 3 months ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- ☆16Updated 7 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Updated 5 years ago