tum-i4 / obfuscation-benchmarks
A set of programs used for benchmarking the strength of obfuscation
☆85Updated 6 years ago
Alternatives and similar repositories for obfuscation-benchmarks:
Users that are interested in obfuscation-benchmarks are comparing it to the libraries listed below
- ☆140Updated 3 months ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆59Updated 2 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆153Updated 2 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆100Updated 2 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 2 years ago
- Symbolic Execution Over Processor Traces☆119Updated 6 months ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆245Updated 2 years ago
- source code for savior fuzzer☆126Updated 4 years ago
- An unofficial implementation of asm2vec as a standalone python package☆162Updated 4 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- Utilities for generating dynamic traces☆90Updated 2 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 9 months ago
- We hinder fuzzing☆66Updated 3 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆176Updated 2 years ago
- AFL++ as a library: gives you all the tools necessary to craft the best fuzzer for your targets with ease!☆112Updated 3 years ago
- ☆44Updated 2 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆146Updated last year
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆121Updated 4 years ago
- ☆44Updated 7 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆50Updated 9 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆94Updated 2 months ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Updated 2 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆127Updated 3 years ago
- Some helper scripts to set up an environment for angr development.☆118Updated 4 months ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- ParmeSan: Sanitizer-guided Greybox Fuzzing☆174Updated 10 months ago