sandialabs / ctadlLinks
CTADL is a static taint analysis tool
☆49Updated 2 months ago
Alternatives and similar repositories for ctadl
Users that are interested in ctadl are comparing it to the libraries listed below
Sorting:
- Library to manipulate and create Sourcetrail databases☆23Updated 5 months ago
- gradient-based symbolic execution engine implemented from scratch☆34Updated last year
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆21Updated 4 months ago
- AIL: The angr Intermediate Language.☆33Updated 5 months ago
- Demo showing Claude Opus does not find CVE-2023-0266☆15Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated 3 weeks ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆123Updated last week
- An approximate solver for concolic execution☆19Updated 6 months ago
- Solving floating point SMT constraints on a GPU☆49Updated 4 years ago
- ☆19Updated last year
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆58Updated 5 months ago
- ☆27Updated 2 years ago
- ☆59Updated 2 years ago
- Easy-to-use grammar-based black-box fuzzer. Has found dozens of bugs in important targets like Clang, Deno, and rustc.☆77Updated this week
- libLISA: Instruction Discovery and Analysis on x86-64☆119Updated 8 months ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- Tantō slices functions into more consumable chunks☆73Updated 6 months ago
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆196Updated 3 years ago
- Target-centric program analysis.☆78Updated 3 weeks ago
- Generation-based, context-free grammar fuzzer.☆52Updated 3 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆51Updated last year
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 10 months ago
- Underconstrained symbolic execution for cryptography verification☆19Updated 4 years ago
- A framework for program analysis with a focus on modeling programmer assumptions, context- and path-sensitive analyses, and type checking…☆55Updated 9 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- BAP python bindings☆21Updated last year
- Program analysis tools developed at Draper on the CBAT project.☆104Updated 2 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆22Updated last month
- Scalable Validator for Binary Lifters☆57Updated 5 years ago