NMHai / BE-PUM
BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (Control Flow Graph) of malware. This project was set out in 2013. It is under management by Dr. Nguyen Minh Hai, HoChiMinh University of Technology.
☆17Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for BE-PUM
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 6 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆22Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆25Updated 8 months ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 5 years ago
- ROPChain generator.☆38Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆38Updated last year
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago
- ☆17Updated 2 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆67Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- experiments for IJON☆11Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 5 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 2 years ago
- ☆30Updated 4 years ago
- Code for my blog post on using S2E for malware analysis☆25Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- reven2-scripts contains a set of REVEN scripts to automate timeless-analysis on REVEN traces.☆30Updated 2 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- ☆87Updated 9 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆27Updated 3 years ago