FuturesLab / Bin2WrongLinks
Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers
☆37Updated last month
Alternatives and similar repositories for Bin2Wrong
Users that are interested in Bin2Wrong are comparing it to the libraries listed below
Sorting:
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆47Updated last month
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Dr. Disassembler☆36Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆34Updated this week
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆20Updated last week
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆20Updated 3 weeks ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- ☆31Updated 4 years ago
- Python bindings for BochsCPU☆36Updated last month
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 2 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 3 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- Scalable Validator for Binary Lifters☆56Updated 5 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 5 months ago
- weggli ruleset scanner for source code and binaries☆29Updated last month
- lxfuzz is a grey-box kernel fuzzer used for linux. it is scalable because of qemu being used to emulate in a way to be able to freely cho…☆22Updated 11 months ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆33Updated 3 years ago
- ☆58Updated 2 years ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆24Updated 2 years ago
- ☆38Updated 2 years ago
- ☆27Updated 2 years ago
- IDB parser☆18Updated this week
- ☆19Updated 10 months ago
- Symbolic executor for Binary Ninja's MLIL☆23Updated 9 months ago
- AIL: The angr Intermediate Language.☆32Updated last month