gradient-based symbolic execution engine implemented from scratch
☆37Dec 16, 2023Updated 2 years ago
Alternatives and similar repositories for Gymbo
Users that are interested in Gymbo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- ☆27Feb 9, 2023Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Mar 6, 2026Updated 3 weeks ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis …☆130Updated this week
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- A precise and scalable pointer analysis for LLVM, written in Ascent☆69Mar 1, 2025Updated last year
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 4 months ago
- Formally verified x86-64 decompilation☆45Mar 19, 2026Updated last week
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 9 months ago
- Visualise the Data Flow Graph of the PCODE at all stages in the decompilation process☆59Apr 5, 2025Updated 11 months ago
- reverse engineering branch predictors☆18Feb 28, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Statistics from our binary transformation framework☆12Jan 16, 2025Updated last year
- ☆16Jan 23, 2022Updated 4 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆21Sep 10, 2024Updated last year
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- IDA Database Parser for Rust☆26Sep 13, 2024Updated last year
- Rag-bag of utilities and scripts that do strange things with ELF files☆18Nov 25, 2025Updated 4 months ago
- Utility library for analysis of Control Flow Graphs, home to the Basque CFGED algorithm.☆34Jan 16, 2026Updated 2 months ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Nov 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆36Feb 4, 2026Updated last month
- A Hybrid Alias Analysis☆19Aug 10, 2023Updated 2 years ago
- Official implementation of the paper "HermesBDD: A Multi-Core and Multi-Platform Binary Decision Diagram Package" accepted @ DDECS 2023.☆13Jul 11, 2025Updated 8 months ago
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated last year
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- ☆14Dec 10, 2021Updated 4 years ago
- Create CFGs and compute complexity metrics for Python, C++, and Java code.☆43May 10, 2024Updated last year
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆39Mar 20, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Common format for transferring and applying function information across binary analysis tools☆60Nov 5, 2025Updated 4 months ago
- X86 disassembler benchmark☆70Oct 26, 2025Updated 5 months ago
- A list of articles outside of the official MLIR docs that I've found useful for learning MLIR☆11Aug 16, 2023Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Artifact for paper "When Subtyping Constraints Liberate: A Novel Type Inference Approach for First-Class Polymorphism" (https://popl24.si…☆15May 22, 2024Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆69May 31, 2024Updated last year