trailofbits / sandshrewLinks
Underconstrained symbolic execution for cryptography verification
☆19Updated 4 years ago
Alternatives and similar repositories for sandshrew
Users that are interested in sandshrew are comparing it to the libraries listed below
Sorting:
- poststructural fuzzing☆31Updated 5 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 9 years ago
- A project for simulating fuzzing such that analysis can be done on coverage/feedback/scaling mechanisms☆9Updated 5 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- rune - radare2 based symbolic emulator☆27Updated 7 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆36Updated 2 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 4 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Updated 5 years ago
- A monitoring script for AFL☆40Updated 8 years ago
- ☆82Updated 8 months ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Updated 7 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 7 years ago
- Recent Fuzzing Paper☆35Updated last year
- tool for multi-execution jump coverage introspection☆64Updated 4 months ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- Target-centric program analysis.☆75Updated last week
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Updated 9 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆36Updated 4 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 6 months ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26Updated 4 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- ☆96Updated 6 years ago
- ☆63Updated 6 years ago