security-pride / WASMakerLinks
WASMaker, a novel differential testing framework that can generate complicated Wasm test cases by disassembling and assembling real-world Wasm binaries, which can trigger hidden inconsistencies among Wasm runtimes.
☆17Updated last year
Alternatives and similar repositories for WASMaker
Users that are interested in WASMaker are comparing it to the libraries listed below
Sorting:
- ☆45Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- ☆16Updated this week
- Binary Ninja plugin for visualizing coverage over time☆25Updated 4 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 8 months ago
- ☆22Updated 11 months ago
- SLOT: SMT-LLVM Optimizing Translation☆60Updated 9 months ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆73Updated 8 months ago
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆25Updated 2 weeks ago
- ☆13Updated 3 years ago
- LLVM Without The ROP Gadgets!☆25Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆42Updated 3 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆52Updated last year
- ☆21Updated 5 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Updated 5 years ago
- Practical fuzzing tutorials and training☆31Updated last year
- Python bindings for BochsCPU☆37Updated 5 months ago
- ☆59Updated 3 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Updated 3 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 8 months ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 5 years ago
- ☆74Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆34Updated last year
- ☆38Updated 2 years ago
- Practical Data-Only Attack Generation☆44Updated last year
- Uncovering Container Confusion in the Linux Kernel☆46Updated last year
- A Hybrid Alias Analysis☆19Updated 2 years ago