BinSigma / BinCompLinks
Compiler Fingerprinting
☆14Updated 10 years ago
Alternatives and similar repositories for BinComp
Users that are interested in BinComp are comparing it to the libraries listed below
Sorting:
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- ☆28Updated 3 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- ☆14Updated 9 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆28Updated 12 years ago
- gnu gcov like tool☆12Updated 10 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- ☆13Updated 9 years ago
- Z3 Symbolic Execution python☆28Updated 7 years ago
- covFuzz☆34Updated 8 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Updated 5 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 7 years ago
- A scriptable debugger library to interact with Android applications☆46Updated 11 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Updated 11 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 7 years ago
- Collection of scripts for radare2☆27Updated 6 years ago
- A pin tool to visualise heap operations☆21Updated 10 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆26Updated 8 years ago
- Dynamic instrumentation of the Linux kernel☆40Updated 10 years ago
- Fuzzer☆43Updated 10 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- ☆24Updated 10 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago