vusec / blindside
☆35Updated 4 years ago
Alternatives and similar repositories for blindside:
Users that are interested in blindside are comparing it to the libraries listed below
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- ☆38Updated 4 years ago
- ☆96Updated 6 years ago
- Recover mutation graph from an AFL seed☆60Updated 4 years ago
- run AFL with pintool☆66Updated 5 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- ☆53Updated 5 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated last year
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- ☆63Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- ☆63Updated 4 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆92Updated 7 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 8 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆74Updated 5 years ago