trtikm / Rebours
A framework for control-flow recovery in binary programs.
☆11Updated 6 years ago
Alternatives and similar repositories for Rebours:
Users that are interested in Rebours are comparing it to the libraries listed below
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- Immunity Debugger Taint Tracer☆20Updated 11 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- Vine: The BitBlaze Static Analysis Component☆25Updated 10 years ago
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Updated 9 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆23Updated 3 months ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆21Updated 4 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆33Updated 3 years ago
- KLEE / CSE Project☆44Updated 4 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 8 years ago
- ☆26Updated 9 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 6 years ago
- S2E plugins library☆17Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Updated 6 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 6 years ago
- Tools built using Dyninst or Dyninst component libraries.☆25Updated last year
- TracerX Symbolic Virtual Machine☆33Updated last month
- Measure branching along code paths☆20Updated 8 years ago
- taint tracer/analysis pintool☆24Updated 10 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- ☆19Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Updated 7 years ago
- Benchmark to test different stop the exploit mitigations☆18Updated 6 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago