revng / qemuLinks
Customized version of QEMU 2.4.0 exposing the TCG frontend and the helpers
☆16Updated last month
Alternatives and similar repositories for qemu
Users that are interested in qemu are comparing it to the libraries listed below
Sorting:
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- Tutorial to write qemu plugins☆34Updated 8 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Updated last year
- CPython bytecode instrumentation and forkserver tools for fuzzing pure python and mixed python/c code using AFL☆31Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆82Updated 4 months ago
- ☆53Updated 6 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆29Updated 6 years ago
- This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.☆85Updated this week
- AFL bindings for Unicorn-Engine☆87Updated last month
- trustonic tbase research☆32Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Updated 5 years ago
- baseband security research☆84Updated 4 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆30Updated 4 years ago
- ☆27Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆21Updated 3 years ago
- ☆58Updated 4 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆64Updated 2 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Fast static binary instrumentation for linux/x86☆83Updated 8 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- LLVM meets Code Property Graphs☆94Updated 4 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆37Updated 3 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆45Updated 3 years ago
- BigMap integration on AFL++☆15Updated 4 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago