ucsb-seclab / pretender
Automatic modeling of hardware to enable the rehosting of embedded firmware
☆82Updated 11 months ago
Alternatives and similar repositories for pretender:
Users that are interested in pretender are comparing it to the libraries listed below
- ☆64Updated 4 years ago
- ☆53Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆58Updated 4 years ago
- ☆32Updated 2 years ago
- ☆38Updated 4 years ago
- ☆96Updated 5 years ago
- Source code of HAL-fuzz☆145Updated 4 years ago
- run AFL with pintool☆65Updated 5 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆101Updated 3 years ago
- ☆64Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆52Updated 6 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- ☆48Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆99Updated 5 years ago
- ☆99Updated 4 years ago
- ☆51Updated 11 months ago
- Utilities for generating dynamic traces☆90Updated 2 years ago
- My fork of American Fuzzy Lop☆61Updated 6 years ago
- OSS-Fuzz - integrated with AFLGo for Patch Testing☆35Updated 7 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 10 months ago
- Modular And Compositional analysis with KLEE Engine☆115Updated 5 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- CollabFuzz: A Framework for Collaborative Fuzzing☆67Updated 3 years ago
- ☆160Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- ☆27Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆101Updated 2 years ago
- run AFL with dynamorio☆37Updated 4 years ago
- ☆62Updated 4 months ago