Learner0x5a / DataFlowAnalysis-miasm
Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.
☆18Updated 2 years ago
Alternatives and similar repositories for DataFlowAnalysis-miasm:
Users that are interested in DataFlowAnalysis-miasm are comparing it to the libraries listed below
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- ALIEN: idA Local varIables/inLine functIons rEcogNizer☆17Updated 3 years ago
- Code snippets for Binary Ninja's Python API☆24Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆83Updated 3 weeks ago
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Re…☆27Updated 9 months ago
- ☆18Updated 4 years ago
- ☆29Updated last year
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated this week
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆28Updated 2 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆118Updated 2 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 2 years ago
- angr源码分析☆33Updated 5 years ago
- ☆20Updated 2 years ago
- ☆20Updated 4 months ago
- Symbolic Execution Over Processor Traces☆119Updated 5 months ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- ☆13Updated 2 years ago
- Superion Mutator for AFLPlusPlus☆32Updated last year
- ☆35Updated 2 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- An Automated Heap Feng Shui Tool☆16Updated 2 years ago
- Binary Ninja plugin for forward/backward slicing☆15Updated 4 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆25Updated 11 months ago
- ☆25Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆61Updated last year