This paper presents a new framework called Dytan for performing dynamic taint analysis. Dytan is designed to be highly flexible, customizable, and general to support experimenting with different dynamic taint analysis techniques. It allows both data-flow and control-flow based taint propagation to be implemented conservatively. The paper describes Dytan's implementation for x86 executables and preliminary studies showing how it can implement various tainting approaches with limited effort. Studies on Firefox demonstrate Dytan can analyze real software and how characteristics of the tainting approach affect efficiency and accuracy. The framework aims to foster experimentation with dynamic taint analysis techniques.