Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.
☆21May 17, 2022Updated 3 years ago
Alternatives and similar repositories for DataFlowAnalysis-miasm
Users that are interested in DataFlowAnalysis-miasm are comparing it to the libraries listed below
Sorting:
- ☆34Apr 7, 2022Updated 3 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- iOS逆向笔记☆18Dec 17, 2023Updated 2 years ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆43Dec 17, 2023Updated 2 years ago
- An AVX Lifter for the Hex-Rays Decompiler + new instructions☆11Oct 14, 2022Updated 3 years ago
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- 白盒CLEFIA加密算法☆14Mar 30, 2016Updated 9 years ago
- AFL++ with support for FormatFuzzer☆18May 28, 2025Updated 9 months ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- Fuzzers implemented with libafl to evaluate several techniques on fuzzbench☆13Oct 10, 2024Updated last year
- 修复停止维护的Vxhunter IDA插件项目在python3高些的版本下运行的若干问题☆14Aug 26, 2024Updated last year
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- BigMap integration on AFL++☆15Apr 5, 2021Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 3 months ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- only for request cve☆18Apr 16, 2025Updated 10 months ago
- ☆12Jun 14, 2023Updated 2 years ago
- This tool is used to handle firmware that binwalk cannot unpack directly and is mainly used for OOB removal, ECC removal, and bad block r…☆17Nov 14, 2022Updated 3 years ago
- ☆12May 24, 2022Updated 3 years ago
- iot安全题目学习记录☆16Dec 13, 2021Updated 4 years ago
- substrate framework for android based on frida☆17May 15, 2020Updated 5 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- AES-128 and DES differential fault analysis☆16Jan 20, 2021Updated 5 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- Offical Implementation for PalmTree☆148Jan 29, 2024Updated 2 years ago
- Virtual Inheritance Reverse Engineering☆19Aug 20, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Sep 15, 2025Updated 5 months ago
- ☆17Mar 9, 2023Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Benchmark☆174Dec 15, 2023Updated 2 years ago
- A symbolic execution engine for LLVM IR☆51Apr 25, 2022Updated 3 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- ☆27Nov 30, 2024Updated last year