srg-imperial / SaBRe
Load-time selective binary rewriting
☆155Updated 2 years ago
Alternatives and similar repositories for SaBRe:
Users that are interested in SaBRe are comparing it to the libraries listed below
- Static instrumentation tool for efficient binary-level coverage analysis.☆145Updated 4 years ago
- Self-hosting binary instrumentation framework for security research☆211Updated last year
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆88Updated 5 years ago
- A tool for analyzing x86-64 binaries.☆311Updated 4 months ago
- Safely execute an arbitrary x86 instruction☆179Updated last year
- fuzzing framework based on libfuzzer and clang sanitizer☆165Updated 5 years ago
- A framework for instrumenting build tools☆84Updated 2 months ago
- Domain-Specific Fuzzing with Waypoints☆237Updated last year
- A LLVM Sanitizer for Symbolic Tracing☆216Updated 5 months ago
- The fastest Intel-PT decoder for fuzzing☆366Updated last year
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆136Updated 3 years ago
- Constraint solver based on coverage-guided fuzzing☆241Updated last year
- ☆83Updated 5 months ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆341Updated 3 months ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆176Updated 2 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆200Updated 5 years ago
- ☆253Updated last year
- PerfFuzz: Automatically Generate Pathological Inputs for C/C++ programs☆133Updated 5 years ago
- Semantics of x86-64 in K☆145Updated 4 years ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆178Updated 2 years ago
- Compiler/source code fuzzing tool using AFL instrumentation☆124Updated 6 years ago
- ☆96Updated 5 years ago
- ☆35Updated 7 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- ☆129Updated 5 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆94Updated 2 months ago
- ☆43Updated 11 months ago