FuturesLab / Bin2WrongLinks
Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers
☆59Updated 7 months ago
Alternatives and similar repositories for Bin2Wrong
Users that are interested in Bin2Wrong are comparing it to the libraries listed below
Sorting:
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated 2 months ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 7 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 11 months ago
- Python bindings for BochsCPU☆37Updated 5 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆35Updated last month
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- Mixed Boolean Arithmetic Simplification using E-Graphs☆24Updated 8 months ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆123Updated last week
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated last year
- ☆45Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆74Updated last year
- Tantō slices functions into more consumable chunks☆76Updated last month
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- breaking decompilers☆55Updated 8 months ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆68Updated last week
- ☆21Updated last year
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Updated 2 years ago
- ☆20Updated 10 months ago
- SMT Modeling for Ghidra's PCODE☆32Updated this week
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆97Updated this week
- transpile llil to c++ for execution and testing☆46Updated 2 years ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆73Updated 7 months ago
- Recover compile-units from stripped binary executables☆58Updated this week
- IDB parser☆24Updated last month
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆43Updated 2 years ago
- ☆81Updated 7 months ago