tandriamil / BrFAST
Browser Fingerprinting Attribute Selection Tool
☆8Updated last year
Alternatives and similar repositories for BrFAST:
Users that are interested in BrFAST are comparing it to the libraries listed below
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆36Updated 2 years ago
- some tlb experimentation code: calculate L1, L2 miss penalties and show cross-HT interference.☆13Updated 5 years ago
- Repo of code for FPStalker article☆32Updated 7 years ago
- ☆10Updated 3 years ago
- Speedy Camera Fingerprinting Library☆23Updated 3 years ago
- ☆9Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆13Updated 5 years ago
- Debugging library to quickly get the minimal crashing test case☆35Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- Ditto.☆17Updated 4 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Updated 4 years ago
- Linux kernel branches for confidential compute research☆17Updated last week
- ☆16Updated last year
- CPython bytecode instrumentation and forkserver tools for fuzzing pure python and mixed python/c code using AFL☆30Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆26Updated last week
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆68Updated 3 years ago
- ☆24Updated last year
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- ☆25Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆24Updated 3 years ago
- Tools created for the DARPA Cyber Grand Challenge that visualize software execution based on traces generated by the CGC Monitor and a Un…☆14Updated 6 years ago
- AIL: The angr Intermediate Language.☆31Updated this week
- Software artifact for incremental CFG patching paper appearing in ASPLOS 21☆12Updated 2 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆18Updated 2 years ago
- QARMA block cipher in C☆26Updated 2 years ago