tum-i4 / obfuscation-benchmarks
A set of programs used for benchmarking the strength of obfuscation
☆85Updated 6 years ago
Alternatives and similar repositories for obfuscation-benchmarks:
Users that are interested in obfuscation-benchmarks are comparing it to the libraries listed below
- ☆135Updated 2 months ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆83Updated 4 years ago
- Symbolic Execution Over Processor Traces☆118Updated 5 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆97Updated 2 years ago
- Utilities for generating dynamic traces☆88Updated 2 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆59Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆153Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- An unofficial implementation of asm2vec as a standalone python package☆161Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 8 months ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- We hinder fuzzing☆65Updated 3 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆80Updated 6 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆176Updated 2 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆71Updated 2 years ago
- ☆96Updated 5 years ago
- source code for savior fuzzer☆126Updated 4 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆94Updated last month
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- ☆44Updated 2 years ago
- Seeding fuzzers with symbolic execution☆202Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 3 years ago
- ☆52Updated 5 years ago
- ☆64Updated 5 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆241Updated 2 years ago
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆174Updated 9 months ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆60Updated last year
- Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference (ICSE '20)☆54Updated 4 years ago