Fare9 / KUNAI-static-analyzerLinks
Tool aimed to provide a binary analysis of different file formats through the use of an Intermmediate Representation.
☆143Updated last year
Alternatives and similar repositories for KUNAI-static-analyzer
Users that are interested in KUNAI-static-analyzer are comparing it to the libraries listed below
Sorting:
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆127Updated last week
- QuarkslaB Dynamic Linker library☆88Updated 9 months ago
- Xyntia, the black-box deobfuscator☆75Updated 3 months ago
- ☆49Updated last year
- A /proc/mem IDA loader to snapshot a running process☆164Updated 2 months ago
- Static Binary Instrumentation☆120Updated 3 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 3 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆164Updated 2 years ago
- Repository of code I've written during my twitch stream, "F'ing Around with Binary Ninja"☆107Updated 4 years ago
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆158Updated 7 months ago
- Control-flow-flattening and string deobfuscator☆155Updated 3 years ago
- An IntelliJ IDEA plugin for working on Ghidra Extensions.☆99Updated last year
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Updated 6 months ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆226Updated 5 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated 2 years ago
- Build your emulation environment as needed☆65Updated 4 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Updated 6 years ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆115Updated this week
- IDA plugin displaying the P-Code for the current function☆67Updated last year
- nanoMIPS IDA plugin☆68Updated 4 years ago
- ☆76Updated 3 years ago
- Practical P-Code examples☆61Updated 4 years ago
- ☆58Updated 4 years ago
- An IDA processor for eBPF bytecode☆48Updated 3 years ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆46Updated 3 years ago
- ☆198Updated 3 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆200Updated this week