Koukyosyumei / GymboLinks
gradient-based symbolic execution engine implemented from scratch
☆34Updated last year
Alternatives and similar repositories for Gymbo
Users that are interested in Gymbo are comparing it to the libraries listed below
Sorting:
- Dr. Disassembler☆35Updated 3 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated this week
- ☆19Updated 8 months ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semanticall…☆27Updated 3 years ago
- C and C++ compiler frontend using PASTA to parse code, and VAST to represent the code as MLIR.☆42Updated 9 months ago
- Program for converting C preprocessor usage to C constructs☆12Updated 2 years ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆19Updated this week
- Solving floating point SMT constraints on a GPU☆49Updated 4 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- AIL: The angr Intermediate Language.☆32Updated this week
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆27Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆31Updated last week
- Scalable Validator for Binary Lifters☆56Updated 4 years ago
- Sydr benchmark applications☆17Updated 2 years ago
- Tutorial for Building Program Reasoning Tools using LLVM and Z3☆19Updated 5 years ago
- Utility library for analysis of Control Flow Graphs, home to the Basque CFGED algorithm.☆28Updated last week
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆20Updated last month
- NVidia sass disassembler☆15Updated this week
- llvm crash analysis☆43Updated 11 months ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 3 years ago
- ☆58Updated 2 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains☆22Updated last year
- ☆23Updated 2 years ago
- Apply ROP protection to a binary using binary rewriting with GTIRB☆32Updated 2 years ago
- ☆25Updated last year
- A demontration of disassemblers generated by sleigh2rust☆13Updated 6 months ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated 5 months ago