toshipiazza / drcfgLinks
Dynamic Control Flow Recovery
☆25Updated 7 years ago
Alternatives and similar repositories for drcfg
Users that are interested in drcfg are comparing it to the libraries listed below
Sorting:
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Assorted pintools☆30Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- x86 Dynamic Binary Translator Library☆34Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Updated 5 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- ☆17Updated 6 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆37Updated 3 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Updated 7 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Updated 4 years ago
- ☆31Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 8 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 7 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- QEMU to drcov trace file☆11Updated 5 years ago
- REIL translation library☆36Updated 9 years ago
- Recover control flow graph from obfuscated codes☆38Updated 10 years ago
- ROP database plugin for IDA☆32Updated 7 years ago
- ☆37Updated 4 years ago
- Ditto.☆18Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago