srg-imperial / SaBReLinks
Load-time selective binary rewriting
☆164Updated 3 years ago
Alternatives and similar repositories for SaBRe
Users that are interested in SaBRe are comparing it to the libraries listed below
Sorting:
- Self-hosting binary instrumentation framework for security research☆217Updated 2 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆151Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- A framework for instrumenting build tools☆90Updated last month
- Safely execute an arbitrary x86 instruction☆203Updated last year
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- Constraint solver based on coverage-guided fuzzing☆249Updated 2 years ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆187Updated 3 years ago
- ☆253Updated 2 years ago
- A dynamic control flow graph (CFG) reconstruction plugin for valgrind.☆130Updated 5 months ago
- ☆52Updated 3 years ago
- The fastest Intel-PT decoder for fuzzing☆376Updated last year
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆140Updated 7 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆56Updated 3 years ago
- Simple Intel CPU processor tracing on Linux☆351Updated 2 years ago
- Manipulate C-family ASTs with Clang☆68Updated 7 years ago
- Scalable Validator for Binary Lifters☆61Updated 5 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆168Updated 6 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- PerfFuzz: Automatically Generate Pathological Inputs for C/C++ programs☆133Updated 5 years ago
- A new context, field, and array-sensitive heap analysis for LLVM bitcode based on DSA.☆168Updated last month
- A tool for analyzing x86-64 binaries.☆337Updated last year
- A static binary rewriter that does not use heuristics☆309Updated 7 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- A LLVM Sanitizer for Symbolic Tracing☆227Updated 6 months ago
- ☆64Updated last year
- LLVM meets Code Property Graphs☆96Updated 4 years ago
- A deterministic, fuzzable pthread implementation☆45Updated 2 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆178Updated 3 years ago