thebabush / reflexLinks
Flex 'em lexers
☆40Updated 4 years ago
Alternatives and similar repositories for reflex
Users that are interested in reflex are comparing it to the libraries listed below
Sorting:
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆138Updated 3 years ago
- Utilities for generating dynamic traces☆92Updated 4 months ago
- ☆96Updated 6 years ago
- Target-centric program analysis.☆77Updated 2 weeks ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- ☆132Updated 5 years ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 7 months ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 9 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- CRETE under development☆59Updated 5 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆113Updated 4 years ago
- Scalable Validator for Binary Lifters☆57Updated 5 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆132Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 2 years ago
- A patched version of VEX to work with PyVEX.☆110Updated 5 months ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 3 years ago
- ☆72Updated last year
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆95Updated 7 months ago
- Timeless debugging with symbolic execution and processor trace☆76Updated 4 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago