vusec / dangsan
☆63Updated 3 years ago
Alternatives and similar repositories for dangsan:
Users that are interested in dangsan are comparing it to the libraries listed below
- ☆63Updated 5 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆72Updated 7 years ago
- ☆56Updated 4 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 7 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆40Updated 4 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 3 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆94Updated 2 months ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 6 years ago
- ☆96Updated 5 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆213Updated 4 months ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆121Updated 4 years ago
- ☆53Updated 5 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 7 years ago
- Seeding fuzzers with symbolic execution☆201Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆99Updated 5 years ago
- Some low-level stuff☆105Updated 9 months ago
- A patched version of VEX to work with PyVEX.☆105Updated this week
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 6 years ago
- ☆61Updated 9 years ago
- Fast static binary instrumentation for linux/x86☆82Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago