CMUSTRUDEL / DIRTYLinks
DIRTY: Augmenting Decompiler Output with Learned Variable Names and Types
☆178Updated last year
Alternatives and similar repositories for DIRTY
Users that are interested in DIRTY are comparing it to the libraries listed below
Sorting:
- Python 3 bridge to Ghidra's Python scripting☆353Updated 2 years ago
- ☆144Updated 7 months ago
- An awesome & curated list of binary rewriting papers☆238Updated 3 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆112Updated 6 months ago
- GitHub Cloner & Compiler☆72Updated 3 years ago
- BTD - Bin To DNN: A DNN Executables Decompiler☆196Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆177Updated 2 years ago
- A research decompiler implemented as a Binary Ninja plugin.☆193Updated this week
- ☆61Updated 6 months ago
- Open-source symbolic execution framework: https://maat.re☆632Updated 9 months ago
- Code and resources for the paper: "Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs"☆206Updated 4 years ago
- ☆63Updated this week
- symbolic execution plugin for binary ninja☆323Updated last month
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆220Updated 4 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is the primary, ca…☆291Updated last month
- Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.☆208Updated 7 months ago
- SymQEMU: Compilation-based symbolic execution for binaries☆346Updated last month
- Ghidra Extension to integrate BinDiff for function matching☆268Updated last week
- An LLVM-based instrumentation tool for universal taint tracking, dataflow analysis, and tracing.☆565Updated last month
- Intermediate Representation for Binary analysis and transformation☆336Updated 3 weeks ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆194Updated this week
- GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.☆263Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated 3 weeks ago
- PASTIS: Collaborative Fuzzing Framework☆164Updated 3 weeks ago
- Core emulator components for Icicle☆226Updated 2 weeks ago
- Neural Variable Renaming for Decompiled Binaries☆44Updated 5 years ago
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆475Updated 5 months ago
- Binary Type Inference Ghidra Plugin☆161Updated last year
- A LLVM Sanitizer for Symbolic Tracing☆221Updated last week
- MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.☆193Updated 2 years ago