ucsb-seclab / pretender
Automatic modeling of hardware to enable the rehosting of embedded firmware
☆80Updated 5 months ago
Related projects: ⓘ
- ☆32Updated 2 years ago
- ☆50Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆57Updated 3 years ago
- ☆37Updated 4 years ago
- run AFL with pintool☆66Updated 4 years ago
- ☆94Updated 5 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆66Updated 2 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆98Updated 4 years ago
- ☆56Updated 4 years ago
- ☆64Updated 4 years ago
- ☆25Updated 3 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆41Updated last year
- Source code of HAL-fuzz☆137Updated 3 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- ☆66Updated 4 years ago
- ☆55Updated 3 months ago
- My fork of American Fuzzy Lop☆61Updated 5 years ago
- ☆91Updated 3 years ago
- Recover mutation graph from an AFL seed☆59Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆83Updated 4 months ago
- ☆49Updated 5 months ago
- ☆64Updated 5 years ago
- ☆47Updated 3 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- ☆111Updated 2 years ago
- Modular And Compositional analysis with KLEE Engine☆113Updated 4 years ago
- Utilities for generating dynamic traces☆88Updated last year
- ☆50Updated 5 years ago
- A pip wrapper around AFL.☆82Updated 3 years ago