s3team / bincfpLinks
Efficient Multi-threaded Binary Code Control Flow Profiling Pintool
☆22Updated 9 years ago
Alternatives and similar repositories for bincfp
Users that are interested in bincfp are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- S2E plugins library☆17Updated 5 years ago
- ☆19Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 10 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- Immunity Debugger Taint Tracer☆20Updated 12 years ago
- taint tracer/analysis pintool☆25Updated 11 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 8 years ago
- Basic Block Trace: DynamoRIO client☆28Updated 3 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Re-randomizing the memory layout of a process at runtime☆21Updated 9 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated 2 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- Program Analysis for LLVM☆38Updated 8 years ago
- ☆26Updated 9 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆88Updated 10 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Updated 7 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆26Updated last week