TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets
☆101Nov 10, 2025Updated 3 months ago
Alternatives and similar repositories for mlta
Users that are interested in mlta are comparing it to the libraries listed below
Sorting:
- TFA project for indirect call analysis☆10Mar 13, 2025Updated 11 months ago
- ☆29Aug 7, 2025Updated 6 months ago
- Pre-built bitcode files for the Linux kernel☆22Sep 18, 2019Updated 6 years ago
- ☆37May 19, 2023Updated 2 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- ☆37Jun 23, 2025Updated 8 months ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆79Dec 30, 2021Updated 4 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- The repo of "BugLens"☆35Nov 12, 2025Updated 3 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- ☆47May 27, 2023Updated 2 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Feb 17, 2025Updated last year
- ☆27Apr 27, 2022Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Feb 28, 2022Updated 4 years ago
- DR.CHECKER : A Soundy Vulnerability Detection Tool for Linux Kernel Drivers☆337Apr 30, 2022Updated 3 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- K-Miner☆74Jun 5, 2019Updated 6 years ago
- ☆21Jan 10, 2019Updated 7 years ago
- ☆47Nov 15, 2021Updated 4 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- Artifacts for CO3: Concolic Co-execution for Firmware☆13Dec 30, 2024Updated last year
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆120Apr 4, 2023Updated 2 years ago
- A LLVM Sanitizer for Symbolic Tracing☆234Feb 7, 2026Updated 3 weeks ago
- [LLVM Static Slicer] Various program analyses, construction of dependence graphs and program slicing of LLVM bitcode.☆524May 21, 2025Updated 9 months ago
- Lifting network implementation to precise format specification☆23Apr 21, 2025Updated 10 months ago
- A Refcount-guided Fuzzer for Exposing Temporal Memory Errors in Linux Kernel☆30Jun 24, 2025Updated 8 months ago
- ☆35Feb 4, 2026Updated 3 weeks ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- ☆134May 6, 2024Updated last year
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Aug 16, 2023Updated 2 years ago
- ☆16Nov 13, 2023Updated 2 years ago
- SymQEMU: Compilation-based symbolic execution for binaries☆368May 5, 2025Updated 9 months ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆422Sep 18, 2021Updated 4 years ago
- SymCC: efficient compiler-based symbolic execution☆856May 12, 2025Updated 9 months ago
- Recent symbolic execution papers and tools.☆182May 16, 2025Updated 9 months ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago