GrammaTech / gtirb-stack-stampLinks
Apply ROP protection to a binary using binary rewriting with GTIRB
☆34Updated 7 months ago
Alternatives and similar repositories for gtirb-stack-stamp
Users that are interested in gtirb-stack-stamp are comparing it to the libraries listed below
Sorting:
- ☆45Updated 4 years ago
- ☆13Updated 3 years ago
- LLVM Without The ROP Gadgets!☆25Updated 2 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆43Updated 2 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- ☆74Updated 2 years ago
- Python bindings for BochsCPU☆37Updated 5 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆68Updated last week
- Mixed Boolean Arithmetic Simplification using E-Graphs☆24Updated 9 months ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 8 months ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Updated 3 years ago
- ☆59Updated 3 years ago
- A library for dynamic binary rewriting☆58Updated 4 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Extracting high level semantic information from binary code☆67Updated 6 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆38Updated 5 years ago
- binary->LLVM->circuits☆19Updated last year
- MBA deobfuscator via Program Synthesis and Term Rewriting☆57Updated 3 months ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- obfuscation that aims to not stand out☆23Updated 3 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Updated 2 years ago
- transpile llil to c++ for execution and testing☆48Updated 2 years ago
- AMD SVM hypervisor rootkit proof of concept☆48Updated 2 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 9 years ago