ucsb-seclab / karonte
Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware
☆405Updated 3 years ago
Alternatives and similar repositories for karonte:
Users that are interested in karonte are comparing it to the libraries listed below
- FIRM-AFL is the first high-throughput greybox fuzzer for IoT firmware.☆450Updated last year
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆343Updated 5 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆345Updated last year
- Fuzzware's main repository. Start here to install.☆328Updated 5 months ago
- Improving AFL by using Intel PT to collect branch information☆292Updated 5 years ago
- Fuzzer for Linux Kernel Drivers☆378Updated 2 years ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆211Updated 4 years ago
- ☆302Updated 3 years ago
- Smart Greybox Fuzzing (https://thuanpv.github.io/publications/TSE19_aflsmart.pdf)☆511Updated 3 years ago
- ☆225Updated last year
- afl-unicorn lets you fuzz any piece of binary that can be emulated by Unicorn Engine.☆605Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆136Updated last year
- My fuzzing corpus☆267Updated 5 years ago
- AFL binary instrumentation☆296Updated 3 months ago
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆285Updated 6 years ago
- ☆160Updated 3 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆299Updated 2 years ago
- AFL/QEMU fuzzing with full-system emulation.☆628Updated 6 years ago
- A grammar-based custom mutator for AFL++☆252Updated 9 months ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆579Updated 6 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆251Updated 6 months ago
- ToolSet for VxWorks Based Embedded Device Analyses☆358Updated 6 months ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆339Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆198Updated 4 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆341Updated 5 months ago
- Automated IoT firmware fuzzing framework.☆80Updated 5 years ago
- Source code of HAL-fuzz☆147Updated 4 years ago
- A simple library to intercept calls to libnvram when running embedded linux applications in emulated environments.☆241Updated last year
- Python core of avatar²☆547Updated 3 weeks ago
- ☆380Updated 5 years ago