IAPCP / Decompiler-SoKLinks
☆16Updated last year
Alternatives and similar repositories for Decompiler-SoK
Users that are interested in Decompiler-SoK are comparing it to the libraries listed below
Sorting:
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆109Updated 2 weeks ago
- Symbolic Execution Over Processor Traces☆122Updated last year
- Full implementaion of Genius☆32Updated 2 years ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- ☆55Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last month
- ☆34Updated 4 years ago
- A data-flow-guided fuzzer☆122Updated 2 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆89Updated 3 years ago
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 3 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆120Updated 2 years ago
- UAF Fuzzing Benchmark☆56Updated 4 years ago
- ☆38Updated 2 years ago
- ☆25Updated 11 months ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆33Updated this week
- cinspector - a static C source code analysis framework☆27Updated last year
- ☆50Updated 3 months ago
- ☆70Updated last year
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆107Updated 4 months ago
- ☆28Updated 2 years ago
- ☆72Updated 3 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆44Updated 2 years ago
- ☆24Updated last week
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- ☆144Updated 10 months ago
- ☆85Updated 9 months ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆157Updated 3 years ago