techge / PRE-listLinks
List of (automatic) protocol reverse engineering tools for network protocols
☆171Updated last year
Alternatives and similar repositories for PRE-list
Users that are interested in PRE-list are comparing it to the libraries listed below
Sorting:
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆57Updated last year
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆170Updated 2 years ago
- ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing☆249Updated last year
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆21Updated 4 years ago
- Recent security papers on firmware analysis☆76Updated 4 years ago
- ☆77Updated 3 years ago
- a blackbox network fuzzer for IoT devices☆55Updated last year
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆358Updated 4 months ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆140Updated 2 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆107Updated 6 years ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆33Updated 4 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 4 years ago
- ☆81Updated 4 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆415Updated 4 years ago
- Repository for monolithic firmware blobs☆84Updated 3 years ago
- ☆195Updated 2 years ago
- ☆233Updated last year
- ☆86Updated 5 months ago
- ☆96Updated last month
- The scalable bug search for binaries☆69Updated 8 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆164Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 5 months ago
- ☆76Updated 3 years ago
- Real firmware fuzz-tested in P2IM paper☆24Updated 4 years ago
- Run fuzzing experiments in Docker☆101Updated 4 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆182Updated 3 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆190Updated last year
- A collection of widely-fuzzed targets☆46Updated 6 years ago