CryptoExperts / wyverse
White-box analytic framework based on LLVM
☆39Updated 5 years ago
Alternatives and similar repositories for wyverse:
Users that are interested in wyverse are comparing it to the libraries listed below
- Decode machine code into VEX IR and translate into LLVM IR☆25Updated 5 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 4 months ago
- IDA (sort of) headless☆22Updated 11 months ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- LLVM based devirtualization PoC’s.☆20Updated 3 years ago
- ☆30Updated 4 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆19Updated last year
- vm -- code interpreter☆26Updated 5 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆34Updated last year
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆21Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- This repo contains the tests and results that were done during the research of SATURN☆37Updated 4 years ago
- Tools for building TIL for IDA SDK & exporting them to python wrapper☆19Updated last year
- funky fun fuzzer☆11Updated 3 years ago
- x86/x64 architecture plugin☆39Updated 10 months ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- Binary Ninja plugin for automating VMProtect analysis☆58Updated 2 years ago
- ☆17Updated last year
- Obfuscator based on logic-bombs☆65Updated 4 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- Ghidra plugin that adds a window showing the high P-code for the current function.☆15Updated last year
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆36Updated 4 years ago
- Instrumenting a binary without source code to bypass anti-debug checks☆33Updated 3 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆21Updated 3 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Raw IDA Kernel API for IDAPython☆33Updated 2 years ago