ucsb-seclab / pretender
Automatic modeling of hardware to enable the rehosting of embedded firmware
☆82Updated last year
Alternatives and similar repositories for pretender:
Users that are interested in pretender are comparing it to the libraries listed below
- ☆65Updated 4 years ago
- Source code of HAL-fuzz☆147Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆100Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- ☆53Updated 5 years ago
- ☆38Updated 4 years ago
- Utilities for generating dynamic traces☆91Updated last month
- ☆32Updated 3 years ago
- run AFL with pintool☆66Updated 5 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆102Updated 4 years ago
- ☆49Updated 4 years ago
- ☆50Updated last year
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- ☆66Updated 5 years ago
- ☆64Updated 6 years ago
- ☆96Updated 6 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆68Updated 3 years ago
- ☆27Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- An AFL implementation with UnTracer (our coverage-guided tracer)☆123Updated 2 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 4 years ago
- ☆98Updated 4 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆101Updated 2 years ago
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆88Updated 11 months ago
- ☆55Updated 5 years ago