techge / PRE-list
List of (automatic) protocol reverse engineering tools for network protocols
☆159Updated 11 months ago
Alternatives and similar repositories for PRE-list:
Users that are interested in PRE-list are comparing it to the libraries listed below
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆54Updated 10 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆69Updated 9 months ago
- “Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "…☆50Updated 7 years ago
- StateAFL: A Greybox Fuzzer for Stateful Network Servers☆164Updated last year
- ProFuzzBench - A Benchmark for Stateful Protocol Fuzzing☆234Updated 8 months ago
- ☆27Updated last year
- Large Language Model guided Protocol Fuzzing (NDSS'24)☆329Updated 7 months ago
- Recent security papers on firmware analysis☆75Updated 3 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆174Updated 2 years ago
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆136Updated last year
- ☆92Updated last year
- ☆226Updated last year
- a blackbox network fuzzer for IoT devices☆53Updated 7 months ago
- Practical Data-Only Attack Generation☆39Updated 10 months ago
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆32Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆149Updated last year
- ☆73Updated 2 years ago
- Repository for monolithic firmware blobs☆74Updated 3 years ago
- ☆186Updated last year
- ☆59Updated 11 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆92Updated 2 weeks ago
- Unofficial implementation of asm2vec using pytorch ( with GPU acceleration )☆80Updated last year
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆405Updated 3 years ago
- Fuzzware's main repository. Start here to install.☆327Updated 5 months ago
- ☆282Updated 8 months ago
- ☆160Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆19Updated 3 years ago
- ☆71Updated 2 years ago