rchtsang / ffxeLinks
☆30Updated last year
Alternatives and similar repositories for ffxe
Users that are interested in ffxe are comparing it to the libraries listed below
Sorting:
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago
- ☆57Updated last year
- ☆31Updated 2 years ago
- ☆47Updated 2 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- ☆11Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year
- ☆94Updated 9 months ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Updated 2 years ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- ☆80Updated 2 years ago
- ☆19Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated 2 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆61Updated last year
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆142Updated 2 years ago
- ☆71Updated last year
- Run fuzzing experiments in Docker☆32Updated 4 years ago
- ☆39Updated last year
- A regression greybox fuzzer aflchurn☆67Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆46Updated 4 years ago
- ☆31Updated 2 years ago
- ☆16Updated 2 years ago
- ☆24Updated 4 months ago
- ☆37Updated 3 years ago
- UAF Fuzzing Benchmark☆58Updated 4 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆99Updated 2 months ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆32Updated last year