techge / PRE-listLinks
List of (automatic) protocol reverse engineering tools for network protocols
☆179Updated last year
Alternatives and similar repositories for PRE-list
Users that are interested in PRE-list are comparing it to the libraries listed below
Sorting:
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆58Updated last year
- Recent security papers on firmware analysis☆76Updated 4 years ago
- ☆77Updated 3 years ago
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆171Updated 2 years ago
- Automated IoT firmware fuzzing framework.☆83Updated 6 years ago
- ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing☆252Updated last year
- a blackbox network fuzzer for IoT devices☆55Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Updated 2 years ago
- ☆81Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 6 months ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆186Updated 3 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆418Updated 4 years ago
- ☆76Updated 3 years ago
- Fuzzware's main repository. Start here to install.☆355Updated last week
- Code for UI, backend, engine and statistical analysis for RE☆23Updated 4 years ago
- ☆237Updated last year
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆364Updated 5 months ago
- Run fuzzing experiments in Docker☆101Updated 4 years ago
- ☆196Updated 2 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆21Updated 4 years ago
- ☆33Updated 2 years ago
- ☆180Updated last year
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆348Updated 2 years ago
- A Framework for fuzzing USB Drivers by Device Emulation☆127Updated 4 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆143Updated 2 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆194Updated last year
- This repository contains dynamic and static tools for IoT malware analysis☆21Updated 3 years ago
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆93Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆107Updated 6 years ago
- ☆68Updated last year