tobuer / StaticTaintAnalysisLinks
面向软件安全的污点数据检测系统
☆24Updated 9 years ago
Alternatives and similar repositories for StaticTaintAnalysis
Users that are interested in StaticTaintAnalysis are comparing it to the libraries listed below
Sorting:
- ☆44Updated 5 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 8 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- 基于clang static analyzer的源码漏洞检测插件☆199Updated 6 years ago
- ☆41Updated 8 years ago
- VxWorks Fuzzer with AFL and QEMU☆49Updated 5 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆46Updated 11 years ago
- angr源码分析☆33Updated 6 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 7 years ago
- Suspended☆75Updated 9 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆30Updated 6 years ago
- ☆67Updated 6 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Updated 7 years ago
- ☆16Updated 7 years ago
- Fuzzilli For quickjs☆28Updated 6 years ago
- Advanced file format fuzzer based-on deep neural language models.☆41Updated 2 years ago
- libdft for win☆52Updated 12 years ago
- ☆11Updated 6 years ago
- expansion of afl-unicorn using c++☆28Updated 6 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- This is the project of LearnAFL.☆28Updated 5 years ago
- MemLock: Memory Usage Guided Fuzzing☆32Updated 5 years ago
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- ☆55Updated 7 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 4 years ago
- AFLNW: network wrapper for AFL☆47Updated last year
- ☆80Updated 7 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- software vulnerabilities☆24Updated 6 years ago
- Security introduction book☆23Updated 10 years ago