LL-MM / approxis-groundtruth
☆31Updated 4 years ago
Alternatives and similar repositories for approxis-groundtruth:
Users that are interested in approxis-groundtruth are comparing it to the libraries listed below
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆30Updated 4 years ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Updated 3 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 4 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆37Updated 4 years ago
- ARMv7 architecture plugin☆40Updated last year
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- transpile llil to c++ for execution and testing☆42Updated last year
- Decode machine code into VEX IR and translate into LLVM IR☆27Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- Futile attempt to solve the Tigress challenges using angr☆26Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- ☆26Updated 6 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- x86/x64 architecture plugin☆39Updated last year
- Binary Ninja Call Graph plugin☆20Updated 3 years ago
- ROP database plugin for IDA☆31Updated 6 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- ☆40Updated 4 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- ☆24Updated 9 years ago
- ☆23Updated 2 months ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year