ucsb-seclab / heapsterView external linksLinks
Identify and test the security of dynamic memory allocators in monolithic firmware images
☆47Sep 2, 2023Updated 2 years ago
Alternatives and similar repositories for heapster
Users that are interested in heapster are comparing it to the libraries listed below
Sorting:
- angr's exploration technique to perform taint analysis☆65Mar 26, 2020Updated 5 years ago
- ☆11Jul 4, 2023Updated 2 years ago
- ☆238Jan 14, 2024Updated 2 years ago
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆339Dec 12, 2024Updated last year
- A collection of resources/tools and analyses for the angr binary analysis framework.☆187Jul 28, 2022Updated 3 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- Repository for monolithic firmware blobs☆88Mar 10, 2022Updated 3 years ago
- DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis☆64Oct 14, 2023Updated 2 years ago
- Symbolic Execution Over Processor Traces☆126Aug 14, 2024Updated last year
- A browser fuzzer augmented by API mod-ref relations☆35Mar 8, 2024Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- ☆37May 11, 2022Updated 3 years ago
- fuzzing + concolic = fuzzolic :)☆127Nov 6, 2025Updated 3 months ago
- a browser fuzzer☆46Mar 15, 2024Updated last year
- ☆25Nov 8, 2023Updated 2 years ago
- ☆27Apr 28, 2023Updated 2 years ago
- A Specification-Guided Approach for Firmware Emulation☆44Apr 22, 2025Updated 9 months ago
- An educational SAT solver written in Rust☆13Sep 23, 2023Updated 2 years ago
- DiAne is a smart fuzzer for IoT devices☆42Apr 3, 2024Updated last year
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆421Sep 18, 2021Updated 4 years ago
- 基于angr的污点分析引擎☆41Apr 19, 2019Updated 6 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- ☆12Feb 17, 2023Updated 2 years ago
- PoC for CVE-2020-11896 Treck TCP/IP stack and device asset investigation☆10Sep 3, 2020Updated 5 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Jul 7, 2022Updated 3 years ago
- autofz: Automated Fuzzer Composition at Runtime☆84Sep 13, 2023Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- A tool for effective testing the binding layer of scripting languages☆79Jun 23, 2022Updated 3 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13May 12, 2025Updated 9 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- ☆17Dec 1, 2024Updated last year