trailofbits / sandshrew
Underconstrained symbolic execution for cryptography verification
☆18Updated 3 years ago
Alternatives and similar repositories for sandshrew:
Users that are interested in sandshrew are comparing it to the libraries listed below
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 9 years ago
- A project for simulating fuzzing such that analysis can be done on coverage/feedback/scaling mechanisms☆9Updated 5 years ago
- poststructural fuzzing☆31Updated 5 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆24Updated 3 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- A Python library for easy and fast program transformation/repair☆15Updated 3 years ago
- Symbolic Execution over Falcon IL☆29Updated 3 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Updated 5 years ago
- rune - radare2 based symbolic emulator☆26Updated 7 years ago
- A monitoring script for AFL☆39Updated 8 years ago
- ☆81Updated 5 months ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆36Updated 2 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- Measure branching along code paths☆20Updated 8 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 3 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆33Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆26Updated 11 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 3 months ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- Reference material for libbeauty☆25Updated 2 years ago
- tool for multi-execution jump coverage introspection☆63Updated last month
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago