techge / PRE-list
List of (automatic) protocol reverse engineering tools for network protocols
☆163Updated 11 months ago
Alternatives and similar repositories for PRE-list
Users that are interested in PRE-list are comparing it to the libraries listed below
Sorting:
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆54Updated 10 months ago
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆166Updated 2 years ago
- ☆30Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆70Updated 9 months ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆136Updated last year
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- Recent security papers on firmware analysis☆76Updated 3 years ago
- ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing☆234Updated 9 months ago
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆335Updated 7 months ago
- ☆74Updated 2 years ago
- a blackbox network fuzzer for IoT devices☆53Updated 8 months ago
- ☆50Updated last year
- ☆92Updated last year
- “Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "…☆50Updated 7 years ago
- ☆161Updated 3 years ago
- Repository for monolithic firmware blobs☆77Updated 3 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆124Updated 4 months ago
- ☆69Updated last week
- Protocol state machine learner and fuzzer for DTLS servers and clients☆37Updated this week
- ☆60Updated this week
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆84Updated 2 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆19Updated 3 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆176Updated 2 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆121Updated 4 years ago
- angr's exploration technique to perform taint analysis☆62Updated 5 years ago
- ☆186Updated 2 years ago
- ☆226Updated last year
- Practical Data-Only Attack Generation☆39Updated 11 months ago
- ☆66Updated 4 years ago
- ☆71Updated 2 years ago