osirislab / imm-taint-traceView external linksLinks
Immunity Debugger Taint Tracer
☆20Jun 18, 2013Updated 12 years ago
Alternatives and similar repositories for imm-taint-trace
Users that are interested in imm-taint-trace are comparing it to the libraries listed below
Sorting:
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.☆19Jan 27, 2011Updated 15 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- ☆45Feb 24, 2018Updated 7 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Lightweight Symbolic Execution Engine☆23Jul 1, 2015Updated 10 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago
- TRACER Symbolic Execution Tool☆28Jun 16, 2020Updated 5 years ago
- Windows平台下的细粒度污点分析工具☆49Mar 16, 2017Updated 8 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- ☆87Jun 5, 2015Updated 10 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Feb 27, 2018Updated 7 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Mar 17, 2015Updated 10 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 8 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Aug 5, 2015Updated 10 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- INACTIVE - http://mzl.la/ghe-archive - Bugzilla Bug Monitor for JS shell bugs☆19Oct 21, 2019Updated 6 years ago
- Tools for stress testing applications.☆12Sep 20, 2020Updated 5 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- Program Analysis for LLVM☆38Mar 25, 2017Updated 8 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- A "general-purpose" tracing tool☆39Jun 22, 2015Updated 10 years ago