season-lab / sok-dbi-securityLinks
Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)"
☆23Updated 5 years ago
Alternatives and similar repositories for sok-dbi-security
Users that are interested in sok-dbi-security are comparing it to the libraries listed below
Sorting:
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- The toolchain of Chosen-instruction attack☆18Updated 3 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 7 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- Collection of DBI evasion techniques☆16Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- kAFL Fuzzer☆34Updated 5 months ago
- FunSeeker: Binary Function Identification Tool☆26Updated last year
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- Build your emulation environment as needed☆65Updated 4 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 4 years ago
- ☆53Updated 6 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- Tutorial to write qemu plugins☆33Updated 8 years ago
- ☆51Updated 3 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago