Static analysis for llvm
☆20Mar 31, 2015Updated 10 years ago
Alternatives and similar repositories for llvm-analysis
Users that are interested in llvm-analysis are comparing it to the libraries listed below
Sorting:
- Inter-procedural analysis framework and dependency/information-flow analysis for LLVM☆19Mar 2, 2013Updated 12 years ago
- Measure branching along code paths☆18Oct 25, 2016Updated 9 years ago
- ☆26Oct 3, 2023Updated 2 years ago
- A use-after-free checker based on SVF.☆20Nov 29, 2017Updated 8 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- Exports an LLVM control flow graph (CFG) (including function calls) to JSON☆25Nov 26, 2021Updated 4 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Jun 30, 2020Updated 5 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Feb 18, 2020Updated 6 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Apr 7, 2019Updated 6 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- Libary for using OScam dvbapi within various applications. This Plugin is not for usage, only experiment and research.☆11Jan 4, 2024Updated 2 years ago
- ☆10Nov 15, 2015Updated 10 years ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆78Sep 16, 2025Updated 5 months ago
- The released code of FuzzGuard in USENIX Security 2020.☆32Feb 28, 2020Updated 6 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ☆12May 30, 2019Updated 6 years ago
- Convergent Dispersal Deduplication Datastore☆10Jan 21, 2016Updated 10 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- llvm Data Flow Graph dump☆36May 24, 2021Updated 4 years ago
- A netmap-based userspace network stack.☆10May 7, 2015Updated 10 years ago
- b.agaric.net base☆12Jul 2, 2023Updated 2 years ago
- ☆11Mar 17, 2021Updated 4 years ago
- ☆10Aug 18, 2024Updated last year
- AFL++(2.63c/2.65c) + aflsmart(5ad7ea3)☆11Oct 20, 2020Updated 5 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated 2 weeks ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- An API that encodes data privacy and protection laws from around the world and returns risk and compliance assessments☆11Jul 3, 2017Updated 8 years ago
- Doing research on top of Jalangi☆12Sep 9, 2016Updated 9 years ago
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- Golang eBPF RASP☆10Jul 19, 2023Updated 2 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- Struct-aware fuzzing framework + some fuzzers☆30Jan 28, 2026Updated 3 weeks ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- ☆11Jan 22, 2020Updated 6 years ago
- FreeBSD service daemon for KBFS, the Keybase filesystem☆13Jul 22, 2021Updated 4 years ago
- This is the example model described in the paper S. Resch and M. Paulitsch, "Using TLA+ in the Development of a Safety-Critical Fault-Tol…☆18Nov 24, 2017Updated 8 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 9 months ago