security-pride / WASMaker
WASMaker, a novel differential testing framework that can generate complicated Wasm test cases by disassembling and assembling real-world Wasm binaries, which can trigger hidden inconsistencies among Wasm runtimes.
☆14Updated 9 months ago
Alternatives and similar repositories for WASMaker
Users that are interested in WASMaker are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- ☆42Updated 4 years ago
- Practical fuzzing tutorials and training☆31Updated 10 months ago
- Binary-only fuzzer for WebAssembly (WASI)☆49Updated 9 months ago
- LLVM Without The ROP Gadgets!☆26Updated last year
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆27Updated 2 years ago
- ☆15Updated 3 months ago
- A Hybrid Alias Analysis☆19Updated last year
- Mixed Boolean Arithmetic Simplification using E-Graphs☆20Updated 2 weeks ago
- Rust library for lifting raw binary data to LLVM IR☆50Updated last month
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Ghidra plugin that adds a window showing the high P-code for the current function.☆15Updated 2 years ago
- Fast and effective grammar-based fuzzing based on Gramatron☆16Updated last month
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆64Updated 2 months ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- SLOT: SMT-LLVM Optimizing Translation☆56Updated last month
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- BREWasm: A general purpose static binary rewriting framework for Wasm.☆23Updated 5 months ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆28Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 4 years ago
- Symbolic Execution Engine in Rust☆20Updated last year
- ☆13Updated 2 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- binary ninja related code☆35Updated last month
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆31Updated 3 months ago
- ☆25Updated last year
- Python interface for Binexport, the Bindiff export format☆16Updated this week