☆78Jun 13, 2022Updated 3 years ago
Alternatives and similar repositories for wasm-binary-security
Users that are interested in wasm-binary-security are comparing it to the libraries listed below
Sorting:
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- wassail (WebAssembly static analyzer and inspection library) is a toolkit to perform both lightweight and heavyweight static analysis of …☆62Aug 13, 2025Updated 6 months ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆31Oct 25, 2021Updated 4 years ago
- ☆27Jun 6, 2023Updated 2 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- ☆22Nov 12, 2020Updated 5 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆16Dec 9, 2020Updated 5 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Aug 11, 2021Updated 4 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- Cool code analysis research for WebAssembly https://urn.kb.se/resolve?urn=urn%3Anbn%3Ase%3Akth%3Adiva-342751☆72May 19, 2023Updated 2 years ago
- A large dataset of real-world WebAssembly binaries, collected from the Web, GitHub, NPM and other sources. Useful as test data, to study …☆67Jul 20, 2022Updated 3 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆52Jul 31, 2024Updated last year
- ☆16Sep 29, 2022Updated 3 years ago
- writeups for our challenges☆147Dec 11, 2022Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- A Generic and Efficient Code Property Graph Infrastructure forScanning Vulnerabilities in WebAssembly Code☆31Aug 16, 2024Updated last year
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- A hacky clang analyzer checker that looks for potentially exploitable kernel integer overflows.☆20May 13, 2018Updated 7 years ago
- de1ctf 2020 mc challs - mc系列题目☆18May 6, 2020Updated 5 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Nov 24, 2021Updated 4 years ago
- Implementing taint tracking in WebAssembly as a part of the V8 Javascript Engine.☆23Apr 17, 2018Updated 7 years ago
- ☆21Feb 15, 2022Updated 4 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- A library and an application to provide migratable primitives for SGX enclaves.☆22Feb 28, 2020Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- Low level attester and verifier drivers for multiple TEEs☆26May 30, 2024Updated last year
- COVA - A static analysis tool to compute path conditions☆40Jul 12, 2025Updated 7 months ago
- ☆42Aug 4, 2020Updated 5 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Security Test Benchmark for Computer Architectures☆21Sep 24, 2025Updated 5 months ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Jan 29, 2018Updated 8 years ago
- ☆18Nov 7, 2024Updated last year
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- ☆11Jun 10, 2024Updated last year