sandialabs / halucinator
Main HALucinator branch
☆40Updated last year
Alternatives and similar repositories for halucinator:
Users that are interested in halucinator are comparing it to the libraries listed below
- Repository for monolithic firmware blobs☆72Updated 2 years ago
- ☆50Updated 11 months ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆172Updated 2 years ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆113Updated 2 months ago
- ☆57Updated 9 months ago
- ☆58Updated 3 months ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- ☆177Updated last year
- Recent security papers on firmware analysis☆76Updated 3 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆104Updated 2 months ago
- ☆167Updated 2 weeks ago
- ☆130Updated 3 years ago
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- ☆27Updated 3 years ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆80Updated last week
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆198Updated 3 years ago
- ☆40Updated last week
- Same-Architecture Firmware Rehosting and Fuzzing☆112Updated 2 months ago
- ☆161Updated 3 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆192Updated this week
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.☆14Updated 5 months ago
- angr's exploration technique to perform taint analysis☆55Updated 4 years ago
- AFL bindings for Unicorn-Engine☆71Updated last month
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆72Updated this week
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆136Updated 3 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆96Updated last year
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- Real firmware fuzz-tested in P2IM paper☆23Updated 4 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆134Updated last year