noobone123 / TypeForgeLinks
TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)
☆36Updated last month
Alternatives and similar repositories for TypeForge
Users that are interested in TypeForge are comparing it to the libraries listed below
Sorting:
- A data-flow-guided fuzzer☆123Updated 2 years ago
- ☆55Updated last year
- cinspector - a static C source code analysis framework☆27Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆111Updated last month
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆110Updated 5 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆99Updated last year
- ☆42Updated 2 years ago
- ☆26Updated last year
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- ☆36Updated last year
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆36Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆61Updated 3 months ago
- ☆17Updated last year
- Code for the NDSS'23 paper "DARWIN: Survival of the Fittest Fuzzing Mutators"☆30Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- ☆79Updated 2 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆64Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆82Updated 8 months ago
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆39Updated 4 months ago
- Symbolic Execution Over Processor Traces☆123Updated last year
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- ☆43Updated 3 months ago
- ☆34Updated 3 years ago
- ☆18Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- ☆29Updated 3 years ago
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated 2 weeks ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago