CrosshairAn analysis tool for Python that blurs the line between testing and type systems.
Stars: ✭ 586 (-7.57%)
Symbolic ExecutionHistory of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)
Stars: ✭ 395 (-37.7%)
BapBinary Analysis Platform
Stars: ✭ 1,385 (+118.45%)
symbooglixSymbolic Execution Engine for Boogie
Stars: ✭ 24 (-96.21%)
DrCCTProfDrCCTProf is a fine-grained call path profiling framework for binaries running on ARM and X86 architectures.
Stars: ✭ 81 (-87.22%)
smooshThe Symbolic, Mechanized, Observable, Operational SHell: an executable formalization of the POSIX shell standard.
Stars: ✭ 86 (-86.44%)
EnlightnYour performance & security consultant, an artisan command away.
Stars: ✭ 378 (-40.38%)
talvosTalvos is a dynamic-analysis framework and debugger for Vulkan/SPIR-V programs.
Stars: ✭ 67 (-89.43%)
crusherNo description or website provided.
Stars: ✭ 21 (-96.69%)
tiroTIRO - A hybrid iterative deobfuscation framework for Android applications
Stars: ✭ 20 (-96.85%)
CRAXCRAX: software CRash analysis for Automatic eXploit generation
Stars: ✭ 44 (-93.06%)
opemOPEM (Open Source PEM Fuel Cell Simulation Tool)
Stars: ✭ 107 (-83.12%)
Compiler RtProject moved to: https://github.com/llvm/llvm-project
Stars: ✭ 272 (-57.1%)
TRACERTRACER Symbolic Execution Tool
Stars: ✭ 23 (-96.37%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (-38.8%)
seninjasymbolic execution plugin for binary ninja
Stars: ✭ 123 (-80.6%)
malware-s2eCode for my blog post on using S2E for malware analysis
Stars: ✭ 21 (-96.69%)
CFI-LBAdaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19
Stars: ✭ 13 (-97.95%)
Tigress protectionPlaying with the Tigress binary protection. Break some of its protections and solve some of its challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
Stars: ✭ 550 (-13.25%)
libdft64libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)
Stars: ✭ 174 (-72.56%)
kleespectreKLEESpectre is a symbolic execution engine with speculation semantic and cache modelling
Stars: ✭ 31 (-95.11%)
Dynamic AnalysisA curated list of dynamic analysis tools for all programming languages, binaries, and more.
Stars: ✭ 340 (-46.37%)
allsafeIntentionally vulnerable Android application.
Stars: ✭ 135 (-78.71%)
RelBinsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at binary-level.
Stars: ✭ 27 (-95.74%)
saiStaged Abstract Interpreters
Stars: ✭ 58 (-90.85%)
zap-sonar-pluginIntegrates OWASP Zed Attack Proxy reports into SonarQube
Stars: ✭ 66 (-89.59%)
SixtyPicalA 6502-oriented low-level programming language supporting advanced static analysis
Stars: ✭ 25 (-96.06%)
WasabiA dynamic analysis framework for WebAssembly programs.
Stars: ✭ 279 (-55.99%)
malossTowards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
Stars: ✭ 46 (-92.74%)
Amocoyet another tool for analysing binaries
Stars: ✭ 413 (-34.86%)
on-edgeA library for detecting certain improper uses of the "Defer, Panic, and Recover" pattern in Go programs
Stars: ✭ 84 (-86.75%)
G2No description or website provided.
Stars: ✭ 24 (-96.21%)
KirenenkoSuper Fast Concolic Execution Engine based on Source Code Taint Tracing
Stars: ✭ 84 (-86.75%)
crete-devCRETE under development
Stars: ✭ 56 (-91.17%)
DLintRuntime checker for JS coding practices
Stars: ✭ 31 (-95.11%)
phuzzFind exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (-91.64%)
EngineDroidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (-39.12%)
surveyorA symbolic debugger for C/C++ (via LLVM), machine code, and JVM programs
Stars: ✭ 14 (-97.79%)
Pin-ApiTracerUpdated version of ApiTracer Pin tool
Stars: ✭ 19 (-97%)
r2frida-bookThe radare2 + frida book for Mobile Application assessment
Stars: ✭ 38 (-94.01%)
R2fridaRadare2 and Frida better together.
Stars: ✭ 610 (-3.79%)
vigorMain repository of the Vigor NF verification project.
Stars: ✭ 40 (-93.69%)
guardrailsguardrails.cs.virginia.edu
Stars: ✭ 18 (-97.16%)
CgpwnA lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks
Stars: ✭ 345 (-45.58%)
jitanaA graph-based static-dynamic hybrid DEX code analysis tool
Stars: ✭ 35 (-94.48%)
ethereum-dasmAn ethereum evm bytecode disassembler and static/dynamic analysis tool
Stars: ✭ 121 (-80.91%)
FromjsSee where each character on the screen came from in code.
Stars: ✭ 537 (-15.3%)
sortcheckTool for detecting violations of ordering axioms in qsort/bsearch callbacks.
Stars: ✭ 23 (-96.37%)
mbsimA multi-body simulation software
Stars: ✭ 22 (-96.53%)
StpSimple Theorem Prover, an efficient SMT solver for bitvectors
Stars: ✭ 341 (-46.21%)
aparoidStatic and dynamic Android application security analysis
Stars: ✭ 62 (-90.22%)
HabomalhunterHaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
Stars: ✭ 627 (-1.1%)
DeepstateA unit test-like interface for fuzzing and symbolic execution
Stars: ✭ 603 (-4.89%)
SaferwallA hackable malware sandbox for the 21st Century
Stars: ✭ 419 (-33.91%)
MedusaBinary instrumentation framework based on FRIDA
Stars: ✭ 258 (-59.31%)