srg-imperial / SaBRe
Load-time selective binary rewriting
☆155Updated 2 years ago
Alternatives and similar repositories for SaBRe:
Users that are interested in SaBRe are comparing it to the libraries listed below
- Self-hosting binary instrumentation framework for security research☆210Updated last year
- Static instrumentation tool for efficient binary-level coverage analysis.☆146Updated 3 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆128Updated 2 years ago
- A tool for analyzing x86-64 binaries.☆307Updated 2 months ago
- Constraint solver based on coverage-guided fuzzing☆240Updated last year
- Safely execute an arbitrary x86 instruction☆178Updated 11 months ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆178Updated 2 years ago
- Rewriting functions in compiled binaries using McSema☆87Updated 5 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆131Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆74Updated 3 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆165Updated 5 years ago
- ☆255Updated last year
- The fastest Intel-PT decoder for fuzzing☆363Updated 11 months ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆136Updated 3 years ago
- A static binary rewriter that does not use heuristics☆301Updated 6 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 5 years ago
- A framework for instrumenting build tools☆84Updated last month
- ☆35Updated 7 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆202Updated 5 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆254Updated last year
- ☆127Updated 5 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆51Updated 2 years ago
- anvill forges beautiful LLVM bitcode out of raw machine code☆345Updated 4 months ago
- SymQEMU: Compilation-based symbolic execution for binaries☆339Updated 2 months ago
- A LLVM Sanitizer for Symbolic Tracing☆212Updated 4 months ago
- ☆67Updated 6 months ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆175Updated 2 years ago
- Generate project templates for executables that use LLVM and LLVM passes☆52Updated 2 years ago