zhilongwang / TaintAnalysisWithPinLinks
Taint analysis with pin tool.
☆9Updated 4 years ago
Alternatives and similar repositories for TaintAnalysisWithPin
Users that are interested in TaintAnalysisWithPin are comparing it to the libraries listed below
Sorting:
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 8 years ago
- taint tracer/analysis pintool☆25Updated 11 years ago
- FlowWalker is a practical off-line taint analysis framework with high efficiency and low overhead.☆10Updated 10 years ago
- S2E plugins library☆17Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- ☆26Updated 9 years ago
- ☆19Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 6 years ago
- AFL fuzzing coverage CFG visualization☆31Updated 7 years ago
- ☆12Updated 8 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Updated 7 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- Rode0day API Client☆18Updated 6 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- RERANZ: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks (See Paper VEE'2017)☆10Updated 7 years ago
- experiments for IJON☆12Updated 6 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆19Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆17Updated 4 years ago
- Vine: The BitBlaze Static Analysis Component☆25Updated 10 years ago
- Basic Block Trace: DynamoRIO client☆27Updated 3 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 9 years ago
- ☆44Updated 5 years ago
- Crappy Win32k syscall fuzzer☆13Updated 10 years ago
- Stony Brook University CFI library☆21Updated 10 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 7 years ago
- ☆43Updated 8 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 5 years ago