tum-i4 / obfuscation-benchmarksLinks
A set of programs used for benchmarking the strength of obfuscation
☆90Updated 7 years ago
Alternatives and similar repositories for obfuscation-benchmarks
Users that are interested in obfuscation-benchmarks are comparing it to the libraries listed below
Sorting:
- ☆144Updated 8 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- Symbolic Execution Over Processor Traces☆121Updated 11 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆61Updated 2 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated last month
- Utilities for generating dynamic traces☆92Updated 3 months ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- ☆43Updated 8 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆80Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆260Updated 4 months ago
- ☆53Updated 6 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated 3 weeks ago
- An unofficial implementation of asm2vec as a standalone python package☆165Updated 4 years ago
- ☆55Updated 4 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 3 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago
- Some helper scripts to set up an environment for angr development.☆117Updated last week
- ☆44Updated 5 years ago
- ☆96Updated 6 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆132Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- source code for savior fuzzer☆127Updated 4 years ago
- An interactive tool for better understanding and intervening fuzzing process via real-time visualization.☆76Updated 3 years ago