vusec / dangsanLinks
☆65Updated 4 years ago
Alternatives and similar repositories for dangsan
Users that are interested in dangsan are comparing it to the libraries listed below
Sorting:
- ☆63Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- CRETE under development☆59Updated 5 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- ☆96Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- Patches to afl to fix bugs or add enhancements☆82Updated 6 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Utilities for generating dynamic traces☆93Updated 7 months ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 8 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- Seeding fuzzers with symbolic execution☆201Updated 8 years ago
- Mozilla fork of the American Fuzzy Lop repo☆47Updated 6 years ago
- ☆55Updated 5 years ago
- Test case minimizer for afl-fuzz☆26Updated 8 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- Distributed Fuzzing for afl☆72Updated 9 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆103Updated last year