sandialabs / ctadlLinks
CTADL is a static taint analysis tool
☆46Updated 3 weeks ago
Alternatives and similar repositories for ctadl
Users that are interested in ctadl are comparing it to the libraries listed below
Sorting:
- gradient-based symbolic execution engine implemented from scratch☆35Updated last year
- Easy-to-use grammar-based black-box fuzzer. Has found dozens of bugs in important targets like Clang, Deno, and rustc.☆77Updated last week
- Library to manipulate and create Sourcetrail databases☆23Updated 3 months ago
- A precise and scalable pointer analysis for LLVM, written in Ascent☆65Updated 6 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆36Updated last week
- AIL: The angr Intermediate Language.☆32Updated 3 months ago
- libLISA: Instruction Discovery and Analysis on x86-64☆116Updated 7 months ago
- CClyzer port to souffle lang☆18Updated last year
- Solving floating point SMT constraints on a GPU☆49Updated 4 years ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆122Updated last week
- Dynamically discover the commands used to create a piece of software☆55Updated 7 months ago
- ☆19Updated last year
- An approximate solver for concolic execution☆18Updated 4 months ago
- ☆25Updated 2 years ago
- An opinionated tool to create amazing presentations☆36Updated 2 years ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- Autarkie - Instant Grammar Fuzzing Using Rust Macros☆80Updated last week
- Verified, Incremental, Binary Editing with Synthesis☆52Updated 2 years ago
- Program analysis tools developed at Draper on the CBAT project.☆104Updated 2 years ago
- A framework for instrumenting build tools☆89Updated 3 weeks ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆21Updated 3 months ago
- ☆27Updated 2 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆52Updated 4 months ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- Demo showing Claude Opus does not find CVE-2023-0266☆15Updated last year
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆130Updated 3 years ago
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆195Updated 2 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆17Updated last year
- C and C++ compiler frontend using PASTA to parse code, and VAST to represent the code as MLIR.☆43Updated last year
- ☆59Updated 2 years ago