purseclab / lightblueView external linksLinks
An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LLVM) and binary analysis (angr).
☆23Jul 1, 2022Updated 3 years ago
Alternatives and similar repositories for lightblue
Users that are interested in lightblue are comparing it to the libraries listed below
Sorting:
- ☆11Jan 8, 2022Updated 4 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- ☆11Apr 7, 2022Updated 3 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Diary of a reverse-engineer blog☆20Oct 2, 2023Updated 2 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 4 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- ☆16Oct 31, 2022Updated 3 years ago
- A decompiler to automatically reverse-engineer the DNN semantics from its compiled binary using program analysis☆83Dec 17, 2024Updated last year
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- Re-randomizing the memory layout of a process at runtime☆21May 28, 2016Updated 9 years ago
- ☆23Apr 7, 2022Updated 3 years ago
- Efficient C implementation of Differential Fault Analysis on AES (round 8 or 9)☆29Jan 4, 2025Updated last year
- ☆27Jul 31, 2021Updated 4 years ago
- ☆11Feb 14, 2023Updated 2 years ago
- Project FlowCog (2017)☆27Aug 23, 2018Updated 7 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Feb 1, 2021Updated 5 years ago
- Fuzzing with controlled compilation☆31Apr 7, 2023Updated 2 years ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆36Feb 6, 2020Updated 6 years ago
- Based on the research of Windows network architecture and the core packet filtering firewall technology, using NDIS intermediate driver, …☆31Feb 16, 2016Updated 9 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆29Nov 4, 2023Updated 2 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- ☆37May 19, 2023Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- "Mingw64 Driver Plus Plus": Mingw64, C++, DDK and (EA)STL made easy!☆43Oct 13, 2025Updated 4 months ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated last year
- SD/MMC Analyzer for Saleae Logic☆39Mar 18, 2024Updated last year
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆38Nov 27, 2024Updated last year
- Compartmentalization using hardware and software techniques.☆11Aug 28, 2025Updated 5 months ago
- C/C++ Windows Process Injector for Educational Purposes.☆10Apr 2, 2021Updated 4 years ago
- C++ Code☆11Aug 13, 2019Updated 6 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated last year
- ☆41Jul 9, 2020Updated 5 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Sep 6, 2021Updated 4 years ago