srg-imperial / SaBReLinks
Load-time selective binary rewriting
☆161Updated 2 years ago
Alternatives and similar repositories for SaBRe
Users that are interested in SaBRe are comparing it to the libraries listed below
Sorting:
- Self-hosting binary instrumentation framework for security research☆215Updated 2 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆149Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- The fastest Intel-PT decoder for fuzzing☆374Updated last year
- A framework for instrumenting build tools☆89Updated last week
- Rewriting functions in compiled binaries using McSema☆89Updated 6 years ago
- ☆253Updated 2 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- A deterministic, fuzzable pthread implementation☆42Updated 2 years ago
- A tool for analyzing x86-64 binaries.☆323Updated 10 months ago
- Safely execute an arbitrary x86 instruction☆184Updated last year
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆185Updated 3 years ago
- A static binary rewriter that does not use heuristics☆306Updated 7 years ago
- Constraint solver based on coverage-guided fuzzing☆248Updated last year
- A LLVM Sanitizer for Symbolic Tracing☆223Updated last month
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 4 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆138Updated 6 years ago
- Why fuzzing with emulators is amazing☆139Updated 5 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆355Updated 3 months ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆55Updated 3 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆167Updated 6 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Scalable Validator for Binary Lifters☆57Updated 5 years ago
- ☆86Updated 4 months ago
- A Dolev-Yao-model-guided fuzzer for TLS☆143Updated last week
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- ☆57Updated last year
- Domain-Specific Fuzzing with Waypoints☆237Updated 2 years ago