vanhauser-thc / dynTaintTracerLinks
a taint tracer based on DynamoRIO, currently ARM only
☆41Updated 5 years ago
Alternatives and similar repositories for dynTaintTracer
Users that are interested in dynTaintTracer are comparing it to the libraries listed below
Sorting:
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Driver Security Analyzer☆52Updated 4 years ago
- ☆31Updated 3 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- BPF Processor for IDA Python☆52Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆29Updated 6 years ago
- PoC code for CVE-2019-14040☆26Updated 5 years ago
- ☆34Updated 4 years ago
- ghidra scripts☆15Updated 4 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆71Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- Slow llvm tracing for the masses☆14Updated 5 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆16Updated 4 years ago
- ☆41Updated 7 years ago
- Signedness-Agnostic Strided-Interval☆37Updated 6 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆9Updated 5 months ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 5 years ago
- ☆18Updated 5 years ago
- Futile attempt to solve the Tigress challenges using angr☆23Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆15Updated 4 years ago
- CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel/createFromParcel mismatch)☆23Updated 7 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Updated 3 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago