You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -10,7 +10,6 @@ The official website, [analysis-tools.dev](https://analysis-tools.dev/) is based
10
10
## What is Dynamic Analysis?
11
11
12
12
> Dynamic program analysis is the analysis of computer software that is performed by executing programs on a real or virtual processor. — [Wikipedia](https://en.wikipedia.org/wiki/Dynamic_program_analysis)
13
-
14
13
## Sponsors
15
14
16
15
This project would not be possible without the generous support of our sponsors.
@@ -26,80 +25,134 @@ This project would not be possible without the generous support of our sponsors.
26
25
27
26
If you also want to support this project, head over to our [Github sponsors page](https://github.com/sponsors/analysis-tools-dev).
28
27
29
-
## Meaning of Symbols:
28
+
## Meaning of Symbols:
30
29
31
30
-:copyright: stands for proprietary software. All other tools are Open Source.
32
31
-:information_source: indicates that the community does not recommend to use this tool for new projects anymore. The icon links to the discussion issue.
33
-
-:warning: means that this tool was not updated for more than 6 months, or the repo was archived.
32
+
-:warning: means that this tool was not updated for more than 1 year, or the repo was archived.
34
33
35
34
Pull requests are very welcome!
36
35
Also check out the sister project, [awesome-static-analysis](https://github.com/mre/awesome-static-analysis).
<!-- Please use HTML syntax here so that it works for Github and mkdocs -->
44
+
<ul>
45
+
<li><a href="#dotnet">.NET</a></li>
46
+
<li><a href="#c">C</a></li>
47
+
<li><a href="#cpp">C++</a></li>
48
+
<li><a href="#java">Java</a></li>
49
+
<li><a href="#javascript">JavaScript</a></li>
50
+
<li><a href="#python">Python</a></li>
51
+
<li><a href="#rust">Rust</a></li>
52
+
<li><a href="#vbasic">Visual Basic</a></li>
53
+
</ul>
54
+
</details>
55
+
56
+
#### [Multiple languages](#multiple-languages-1)
57
+
58
+
#### [Other](#other-1)
59
+
60
+
-[Binaries](#binary)
61
+
-[Containers](#container)
62
+
-[Security](#security)
63
+
64
+
65
+
---
66
+
67
+
## Programming Languages
68
+
69
+
<h2id="dotnet">.NET</h2>
70
+
71
+
-[Microsoft IntelliTest](https://docs.microsoft.com/en-us/visualstudio/test/intellitest-manual/getting-started?view=vs-2019) - Generate a candidate suite of tests for your .NET code.
72
+
-[Pex and Moles](https://www.microsoft.com/en-us/research/project/pex-and-moles-isolation-and-white-box-unit-testing-for-net/) - Pex automatically generates test suites with high code coverage using automated white box analysis.
73
+
74
+
75
+
<h2id="c">C</h2>
76
+
77
+
-[KLEE](https://github.com/klee/klee) - Symbolic virtual machine built on top of the LLVM compiler infrastructure.
78
+
-[LDRA](https://ldra.com):copyright: - A tool suite incuding dynamic analysis and test to various standards can ensure test coverage to 100% op-code, branch & decsion coverage.
79
+
-[LLVM/Clang Sanitizers](https://github.com/google/sanitizers) - <ul> <li><ahref="https://github.com/google/sanitizers/wiki/AddressSanitizer">AddressSanitizer</a> - A memory error detector for C/C++</li> <li><ahref="https://github.com/google/sanitizers/wiki/MemorySanitizer">MemorySanitizer</a> - A detector of uninitialized memory reads in C/C++ programs.</li> <li><ahref="https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual">ThreadSanitizer</a> - A data race detector for C/C++</li> </ul>
80
+
-[tis-interpreter](https://github.com/TrustInSoft/tis-interpreter) - An interpreter for finding subtle bugs in programs written in standard C.
81
+
-[Valgrind](http://valgrind.org/) - An instrumentation framework for building dynamic analysis tools.
82
+
83
+
84
+
<h2id="cpp">C++</h2>
39
85
40
-
*[angr](https://github.com/angr/angr) - Platform agnostic binary analysis framework from UCSB.
41
-
*[TRITON](https://github.com/JonathanSalwan/Triton) - Dynamic Binary Analysis for x86 binaries.
42
-
*[DynamoRIO](http://www.dynamorio.org/) - is a runtime code manipulation system that supports code transformations on any part of a program, while it executes.
43
-
*[Pin Tools](https://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool) - A dynamic binary instrumentation tool and a platform for creating analysis tools.
86
+
-[KLEE](https://github.com/klee/klee) - Symbolic virtual machine built on top of the LLVM compiler infrastructure.
87
+
-[LDRA](https://ldra.com):copyright: - A tool suite incuding dynamic analysis and test to various standards can ensure test coverage to 100% op-code, branch & decsion coverage.
88
+
-[LLVM/Clang Sanitizers](https://github.com/google/sanitizers) - <ul> <li><ahref="https://github.com/google/sanitizers/wiki/AddressSanitizer">AddressSanitizer</a> - A memory error detector for C/C++</li> <li><ahref="https://github.com/google/sanitizers/wiki/MemorySanitizer">MemorySanitizer</a> - A detector of uninitialized memory reads in C/C++ programs.</li> <li><ahref="https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual">ThreadSanitizer</a> - A data race detector for C/C++</li> </ul>
89
+
-[tis-interpreter](https://github.com/TrustInSoft/tis-interpreter) - An interpreter for finding subtle bugs in programs written in standard C.
90
+
-[Valgrind](http://valgrind.org/) - An instrumentation framework for building dynamic analysis tools.
44
91
45
-
## Container
46
92
47
-
*[cadvisor](https://github.com/google/cadvisor) - Analyzes resource usage and performance characteristics of running containers.
93
+
<h2id="java">Java</h2>
48
94
49
-
## C/C++
95
+
-[Java PathFinder](https://github.com/javapathfinder/jpf-core) - An extensible software model checking framework for Java bytecode programs.
96
+
-[Parasoft Jtest](https://www.parasoft.com/products/jtest):copyright: - Jtest is an automated Java software testing and static analysis product that is made by Parasoft. The product includes technology for Data-flow analysis Unit test-case generation and execution, static analysis, regression testing, code coverage, and runtime error detection.
50
97
51
-
*[KLEE](https://github.com/klee/klee) - Symbolic virtual machine built on top of the LLVM compiler infrastructure.
52
-
*[tis-interpreter](https://github.com/TrustInSoft/tis-interpreter) - An interpreter for finding subtle bugs in programs written in standard C
53
-
*[Valgrind](http://valgrind.org/) - An instrumentation framework for building dynamic analysis tools
54
-
*[LDRA](https://ldra.com):copyright: - a tool suite incuding dynamic analysis and test to various standards can ensure test coverage to 100% op-code, branch & decsion coverage.
-[AddressSanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizer) - A memory error detector for C/C++
57
-
-[MemorySanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer) - A detector of uninitialized memory reads in C/C++ programs.
58
-
-[ThreadSanitizer](https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual) - A data race detector for C/C++
59
98
60
-
## Java
99
+
<h2id="javascript">JavaScript</h2>
61
100
62
-
*[Java PathFinder](https://github.com/javapathfinder/jpf-core) - An extensible software model checking framework for Java bytecode programs.
63
-
*[Parasoft Jtest](https://www.parasoft.com/products/jtest):copyright: - Jtest is an automated Java software testing and static analysis product that is made by Parasoft. The product includes technology for Data-flow analysis Unit test-case generation and execution, static analysis, regression testing, code coverage, and runtime error detection.
101
+
-[Iroh.js](https://github.com/maierfelix/Iroh) - A dynamic code analysis tool for JavaScript. Iroh allows to record your code flow in realtime, intercept runtime informations and manipulate program behaviour on the fly.
102
+
-[Jalangi2](https://github.com/Samsung/jalangi2) - Jalangi2 is a popular framework for writing dynamic analyses for JavaScript.
64
103
65
-
## JavaScript
66
104
67
-
*[Iroh.js](https://github.com/maierfelix/Iroh) -A dynamic code analysis tool for JavaScript. Iroh allows to record your code flow in realtime, intercept runtime informations and manipulate program behaviour on the fly.
68
-
*[Jalangi2](https://github.com/Samsung/jalangi2) - Jalangi2 is a popular framework for writing dynamic analyses for JavaScript.
105
+
<h2id="python">Python</h2>
69
106
70
-
## Python
107
+
-[typo](https://github.com/aldanor/typo) - Runtime Type Checking for Python 3.
71
108
72
-
*[typo](https://github.com/aldanor/typo) - Runtime Type Checking for Python 3
73
109
74
-
## .NET
110
+
<h2id="rust">Rust</h2>
75
111
76
-
*[Microsoft IntelliTest](https://docs.microsoft.com/en-us/visualstudio/test/intellitest-manual/getting-started?view=vs-2019) - Generate a candidate suite of tests for your .NET code.
77
-
*[Pex and Moles](https://www.microsoft.com/en-us/research/project/pex-and-moles-isolation-and-white-box-unit-testing-for-net/) - Pex automatically generates test suites with high code coverage using automated white box analysis.
112
+
-[MIRI](https://github.com/rust-lang/miri) - An interpreter for Rust's mid-level intermediate representation, which can detect certain classes of undefined behavior like out-of-bounds memory accesses and use-after-free.
113
+
-[puffin](https://github.com/EmbarkStudios/puffin) - Instrumentation profiler for Rust.
114
+
-[stuck](https://github.com/jonhoo/stuck) - provides a visualization for quickly identifying common bottlenecks in running, asynchronous, and concurrent applications.
78
115
79
-
## Rust
80
116
81
-
*[MIRI](https://github.com/rust-lang/miri) - An interpreter for Rust's mid-level intermediate representation, which can detect certain classes of undefined behavior like out-of-bounds memory accesses and use-after-free.
82
-
*[puffin](https://github.com/EmbarkStudios/puffin) - Instrumentation profiler for Rust.
83
-
*[stuck](https://github.com/jonhoo/stuck) - provides a visualization for quickly identifying common bottlenecks in running, asynchronous, and concurrent applications.
117
+
<h2id="vbasic">Visual Basic</h2>
84
118
85
-
## Visual Basic
119
+
-[VB Watch](https://www.aivosto.com/vbwatch.html):copyright: - Profiler, Protector and Debugger for VB6. Profiler measures performance and test coverage. Protector implements robust error handling. Debugger helps monitor your executables.
86
120
87
-
*[VB Watch](https://www.aivosto.com/vbwatch.html):copyright: - Profiler, Protector and Debugger for VB6. Profiler measures performance and test coverage. Protector implements robust error handling. Debugger helps monitor your executables.
88
121
89
122
## Multiple languages
90
123
91
-
*[AppScan Standard](https://www.hcltechsw.com/wps/portal/products/appscan/home/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8zi_QO8nQ0MnQ0C_F3MnA0CHX2dvYN9woxNvEz0w1EVWDgGuQAVeLpbBvu6Gxl4m-hHUaLfxJQ4_QY4gKMBifZjKojCb3y4fhSqFe6Bpk5AEwIMTNyMfYzdfczQFWAJIrwKQGFAyBUFuaGhoREGmZ7piooAwLgEZw!!/?1dmy&urile=wcm%3apath%3a/wps/wcm/connect/hcl+software+content/products/appscan/offerings/standard):copyright: - HCL's AppScan is a dynamic application security testing suite ([previously by IBM](https://newsroom.ibm.com/2018-12-06-HCL-Technologies-to-Acquire-Select-IBM-Software-Products-for-1-8B)).
92
-
*[Code Pulse](http://code-pulse.com/) - Code Pulse is a free real-time code coverage tool for penetration testing activities by OWASP and Code Dx ([GitHub](https://github.com/codedx/codepulse)).
93
-
*[Dr. Memory](https://drmemory.org/) - Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors ([Github](https://github.com/DynamoRIO/drmemory)).
94
-
*[Gcov](https://gcc.gnu.org/onlinedocs/gcc/Gcov.html) - GNU source code coverage program. Code coverage tool and profiling tool which is part of the GCC. Supports C, C++, Fortran.
95
-
*[Minded Security BlueClosure](https://www.mindedsecurity.com/index.php/products/blueclosure):copyright: - Dynamic web application security scanner. It uses dynamic data tainting in order to understand if a DOM XSS is exploitable and uses the browser JavaScript engine for understanding the code.
96
-
*[WhiteHat Sentinel Dynamic](https://www.whitehatsec.com/products/dynamic-application-security-testing/):copyright: - Part of the WhiteHat Application Security Platform. Dynamic application security scanner that covers the OWASP Top 10.
124
+
-[Code Pulse](http://code-pulse.com/) - Code Pulse is a free real-time code coverage tool for penetration testing activities by OWASP and Code Dx ([GitHub](https://github.com/codedx/codepulse)).
125
+
-[Gcov](https://gcc.gnu.org/onlinedocs/gcc/Gcov.html) - GNU source code coverage program. Code coverage tool and profiling tool which is part of the GCC. Supports C, C++, Fortran.
126
+
-[WhiteHat Sentinel Dynamic](https://www.whitehatsec.com/products/dynamic-application-security-testing/):copyright: - Part of the WhiteHat Application Security Platform. Dynamic application security scanner that covers the OWASP Top 10.
127
+
128
+
129
+
## Other
130
+
131
+
132
+
133
+
<h2id="binary">Binaries</h2>
134
+
135
+
-[angr](https://github.com/angr/angr) - Platform agnostic binary analysis framework from UCSB.
136
+
-[Dr. Memory](https://drmemory.org/) - Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors ([Github](https://github.com/DynamoRIO/drmemory)).
137
+
-[DynamoRIO](http://www.dynamorio.org/) - Is a runtime code manipulation system that supports code transformations on any part of a program, while it executes.
138
+
-[Pin Tools](https://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool) - A dynamic binary instrumentation tool and a platform for creating analysis tools.
139
+
-[TRITON](https://triton.quarkslab.com/) - Dynamic Binary Analysis for x86 binaries.
140
+
141
+
142
+
<h2id="container">Containers</h2>
143
+
144
+
-[cadvisor](https://github.com/google/cadvisor) - Analyzes resource usage and performance characteristics of running containers.
145
+
146
+
147
+
<h2id="security">Security</h2>
148
+
149
+
-[AppScan Standard](https://www.hcltechsw.com/wps/portal/products/appscan/home/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8zi_QO8nQ0MnQ0C_F3MnA0CHX2dvYN9woxNvEz0w1EVWDgGuQAVeLpbBvu6Gxl4m-hHUaLfxJQ4_QY4gKMBifZjKojCb3y4fhSqFe6Bpk5AEwIMTNyMfYzdfczQFWAJIrwKQGFAyBUFuaGhoREGmZ7piooAwLgEZw!!/?1dmy&urile=wcm%3apath%3a/wps/wcm/connect/hcl+software+content/products/appscan/offerings/standard):copyright: - HCL's AppScan is a dynamic application security testing suite ([previously by IBM](https://newsroom.ibm.com/2018-12-06-HCL-Technologies-to-Acquire-Select-IBM-Software-Products-for-1-8B)).
150
+
-[Minded Security BlueClosure](https://www.mindedsecurity.com/index.php/products/blueclosure):copyright: - Dynamic web application security scanner. It uses dynamic data tainting in order to understand if a DOM XSS is exploitable and uses the browser JavaScript engine for understanding the code.
0 commit comments