s3team / CryptoHunt
☆43Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for CryptoHunt
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆71Updated 2 years ago
- ☆50Updated 5 years ago
- ☆44Updated 4 years ago
- Futile attempt to solve the Tigress challenges using angr☆22Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆57Updated 3 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 7 years ago
- AFL fuzzing coverage CFG visualization☆30Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆98Updated 5 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago
- run AFL with pintool☆65Updated 4 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆83Updated 4 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆45Updated 10 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 5 years ago
- ☆53Updated 4 years ago
- ☆67Updated 4 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- ROP Benchmark is a tool to compare ROP compilers☆39Updated last year
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆135Updated 5 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago