srg-imperial / SaBRe
Load-time selective binary rewriting
☆156Updated 2 years ago
Alternatives and similar repositories for SaBRe:
Users that are interested in SaBRe are comparing it to the libraries listed below
- Self-hosting binary instrumentation framework for security research☆212Updated last year
- Static instrumentation tool for efficient binary-level coverage analysis.☆145Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆88Updated 5 years ago
- A framework for instrumenting build tools☆84Updated 3 months ago
- Safely execute an arbitrary x86 instruction☆180Updated last year
- A static binary rewriter that does not use heuristics☆303Updated 6 years ago
- Constraint solver based on coverage-guided fuzzing☆243Updated last year
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- A tool for analyzing x86-64 binaries.☆313Updated 5 months ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆179Updated 2 years ago
- ☆43Updated last year
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆132Updated 6 years ago
- Automatic inference of a formal specification of the x86_64 instruction set☆69Updated 8 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- The fastest Intel-PT decoder for fuzzing☆367Updated last year
- ☆35Updated 7 years ago
- fuzzing framework based on libfuzzer and clang sanitizer☆164Updated 5 years ago
- ☆83Updated 6 months ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆201Updated 6 years ago
- Manipulate C-family ASTs with Clang☆64Updated 6 years ago
- The Jakstab static analysis platform for binaries☆158Updated 5 years ago
- A new context, field, and array-sensitive heap analysis for LLVM bitcode based on DSA.☆164Updated 9 months ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 2 years ago
- Fast and efficient binary translator☆58Updated 6 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆137Updated 3 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆341Updated 4 months ago
- A LLVM Sanitizer for Symbolic Tracing☆217Updated 6 months ago