tthtlc / source-sink-ghidraLinks
Collections of student projects to find execution path in binary program via taint analysis using Ghidra
☆16Updated 3 years ago
Alternatives and similar repositories for source-sink-ghidra
Users that are interested in source-sink-ghidra are comparing it to the libraries listed below
Sorting:
- ☆91Updated 8 months ago
- Material and examples for a presentation on static binary analysis.☆46Updated 4 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago
- A data-flow-guided fuzzer☆124Updated 2 years ago
- ☆237Updated last year
- A de-socketing tool that is 10x faster than desock (Preeny) in fuzzing network protocols☆93Updated 3 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆142Updated 2 years ago
- ☆47Updated 2 years ago
- ☆30Updated last year
- ☆94Updated 9 months ago
- Coverage-guided Fuzzing as Online Stochastic Control☆57Updated last year
- ☆80Updated 2 years ago
- a blackbox network fuzzer for IoT devices☆56Updated last year
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆126Updated 9 months ago
- A collection of widely-fuzzed targets☆46Updated 6 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆119Updated 2 months ago
- ☆31Updated 2 years ago
- Real firmware fuzz-tested in P2IM paper☆24Updated 5 years ago
- a browser fuzzer☆46Updated last year
- Produce code coverage results with gcov from afl-fuzz test cases☆89Updated last year
- Companion repository to the Fuzzing101 with LibAFL series of blog posts.☆165Updated 10 months ago
- ☆37Updated 3 years ago
- My fork of American Fuzzy Lop☆61Updated 7 years ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- ☆11Updated 2 years ago
- ☆69Updated 2 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆96Updated 2 years ago
- Perry: automated peripheral modeling with symbolic execution☆28Updated last year