zardus / paper-templatesLinks
A set of templates for different academic venues.
☆29Updated 6 years ago
Alternatives and similar repositories for paper-templates
Users that are interested in paper-templates are comparing it to the libraries listed below
Sorting:
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 3 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- Writeups of CTF challenges I do☆13Updated 6 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Updated 9 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- Reverse Engineering tool for Ethereum EVM☆18Updated 9 years ago
- Simulate afl-fuzz☆16Updated 6 years ago
- ROPChain generator.☆40Updated 7 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26Updated 9 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Updated 10 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Updated 8 years ago
- Tool for detecting error handling bugs☆23Updated 9 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- A monitoring script for AFL☆40Updated 8 years ago
- run AFL with pintool☆66Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 7 years ago
- TEMU: The BitBlaze Dynamic Analysis Component (with some patches).☆67Updated 10 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago
- REIL translation library☆36Updated 9 years ago
- Experiments in trying to find 0-days in numpy☆38Updated 8 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆26Updated 3 weeks ago