tetrane / tetrane-oss
Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.
☆19Updated last year
Related projects ⓘ
Alternatives and complementary repositories for tetrane-oss
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- ghidra scripts☆15Updated 3 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- ☆35Updated 3 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- Ditto.☆16Updated 4 years ago
- ☆17Updated 2 years ago
- expansion of afl-unicorn using c++☆27Updated 5 years ago
- QEMU to drcov trace file☆11Updated 3 years ago
- IDA (sort of) headless☆20Updated 8 months ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 4 years ago
- ☆18Updated 6 years ago
- Malware analysis tool based on taint analysis.☆14Updated 2 years ago
- ☆30Updated 4 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Source code of "Dezhou Instrumentz" challenge from RealWorldCTF 2019 quals☆22Updated 3 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- Idapro cpu for OpenRISC arch☆15Updated 7 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated last month
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆30Updated 3 years ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 9 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- ☆14Updated last year
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 7 years ago
- ☆16Updated 4 years ago
- ☆14Updated 6 years ago