Performant type-checking for python.
-
Updated
Aug 12, 2020 - OCaml
Performant type-checking for python.
A static analysis tool for finding errors in PHP applications
A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a dynamic taint engine, AST representations of the x86, x86-64, ARM32 and AArch64 Instructions Set Architecture (ISA), SMT simplification passes, an SMT solver interface and, the last but not least, Python bindings.
The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
Binary Analysis Platform
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
Playing with the Tigress binary protection. Break some of its protections and solve some of its challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
A taint-tracking plugin for the Valgrind memory checking tool
Malware Behavior Analyzer
libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)
KLEE-TAINT - Klee with taint analysis support
Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )
a tain tracer based on DynamoRIO, currently ARM only
Go Taint CHeck Analyser
A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain
Assorted pintools
A dynamic analysis platform for Android
Github mirror of "mediawiki/tools/phan/SecurityCheckPlugin" - our actual code is hosted with Gerrit (please see https://www.mediawiki.org/wiki/Developer_access for contributing)
PIITracker: Automatic Tracking of Personally Identifiable Information in Windows
FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking
just an experiment
The Reverse Engineering Assistant of your dreams
JavaScript virtual machine for WebAssembly and Taint Tracking security tool
TaintFlow, a framework for JavaScript dynamic information flow analysis.
A CFL-r-based static analyser
Research on Saluki - software for finding taint style vulnerabilities in a binary code
Formal model of program execution, symbolic execution, and taint tracking
Add a description, image, and links to the taint-analysis topic page so that developers can more easily learn about it.
To associate your repository with the taint-analysis topic, visit your repo's landing page and select "manage topics."