srg-imperial / SaBReLinks
Load-time selective binary rewriting
☆160Updated 2 years ago
Alternatives and similar repositories for SaBRe
Users that are interested in SaBRe are comparing it to the libraries listed below
Sorting:
- Self-hosting binary instrumentation framework for security research☆215Updated 2 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆148Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆89Updated 5 years ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆185Updated 3 years ago
- The fastest Intel-PT decoder for fuzzing☆373Updated last year
- A framework for instrumenting build tools☆89Updated last month
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- ☆252Updated 2 years ago
- Constraint solver based on coverage-guided fuzzing☆248Updated last year
- ☆52Updated 3 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Safely execute an arbitrary x86 instruction☆181Updated last year
- A tool for analyzing x86-64 binaries.☆322Updated 9 months ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- A dynamic control flow graph (CFG) reconstruction plugin for valgrind.☆124Updated 4 months ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆36Updated 3 years ago
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆54Updated 3 years ago
- Manipulate C-family ASTs with Clang☆65Updated 6 years ago
- Why fuzzing with emulators is amazing☆139Updated 4 years ago
- A patched version of VEX to work with PyVEX.☆110Updated 5 months ago
- LLVM meets Code Property Graphs☆93Updated 4 years ago
- Scalable Validator for Binary Lifters☆57Updated 5 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆136Updated 6 years ago
- A deterministic, fuzzable pthread implementation☆41Updated 2 years ago
- Simple Intel CPU processor tracing on Linux☆349Updated 2 years ago
- PerfFuzz: Automatically Generate Pathological Inputs for C/C++ programs☆134Updated 5 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆69Updated last year
- Python command-line tool and GDB extension to view and save x86, ARM and objdump assembly files as control-flow graph (CFG) pdf files☆76Updated last year