projectbtle / argXtract
Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).
☆27Updated 2 years ago
Related projects: ⓘ
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 7 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆33Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆35Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆34Updated 2 years ago
- A Coverage-Based fuzzing tools☆22Updated 3 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 3 years ago
- 基于angr的污点分析引擎☆37Updated 5 years ago
- ☆20Updated 5 months ago
- aurora-d☆20Updated 2 years ago
- VxWorks Fuzzer with AFL and QEMU☆45Updated 4 years ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆63Updated 2 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆21Updated last year
- a new cfi mechanism☆31Updated 2 years ago
- ☆21Updated last year
- ☆21Updated 10 months ago
- ☆16Updated 4 years ago
- ☆32Updated 2 years ago
- ☆41Updated 6 years ago
- AFLNW: network wrapper for AFL☆42Updated 6 months ago
- ☆84Updated last year
- android kernel pwn☆19Updated 5 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 2 years ago
- ☆13Updated 3 years ago
- ☆70Updated 3 years ago
- ☆44Updated 4 years ago
- ☆34Updated 2 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Updated 3 years ago