srg-imperial / SaBReLinks
Load-time selective binary rewriting
☆161Updated 3 years ago
Alternatives and similar repositories for SaBRe
Users that are interested in SaBRe are comparing it to the libraries listed below
Sorting:
- Self-hosting binary instrumentation framework for security research☆217Updated 2 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆149Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Rewriting functions in compiled binaries using McSema☆89Updated 6 years ago
- Safely execute an arbitrary x86 instruction☆185Updated last year
- A framework for instrumenting build tools☆89Updated last week
- A tool for analyzing x86-64 binaries.☆323Updated 10 months ago
- Constraint solver based on coverage-guided fuzzing☆248Updated last year
- A dynamic control flow graph (CFG) reconstruction plugin for valgrind.☆126Updated last month
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- ☆252Updated 2 years ago
- Manipulate C-family ASTs with Clang☆66Updated 6 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆137Updated 6 years ago
- Scalable Validator for Binary Lifters☆57Updated 5 years ago
- A static binary rewriter that does not use heuristics☆306Updated 7 years ago
- The fastest Intel-PT decoder for fuzzing☆374Updated last year
- Delta Pointers: Buffer Overflow Checks Without the Checks (EuroSys'18)☆55Updated 3 years ago
- Lean C/C++ Bounds Checking with Low-Fat Pointers☆186Updated 3 years ago
- PerfFuzz: Automatically Generate Pathological Inputs for C/C++ programs☆134Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Compiler/source code fuzzing tool using AFL instrumentation☆124Updated 7 years ago
- Automatic inference of a formal specification of the x86_64 instruction set☆71Updated 9 years ago
- Timeless debugging with symbolic execution and processor trace☆75Updated 4 years ago
- LLVM meets Code Property Graphs☆93Updated 4 years ago
- Python command-line tool and GDB extension to view and save x86, ARM and objdump assembly files as control-flow graph (CFG) pdf files☆77Updated last year
- The Jakstab static analysis platform for binaries☆160Updated 5 years ago
- A LLVM Sanitizer for Symbolic Tracing☆223Updated 2 months ago
- Fast static binary instrumentation for linux/x86☆83Updated 8 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆354Updated 4 months ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆140Updated 4 years ago