The Binary Mutation code based on Uroboros
☆14Feb 20, 2019Updated 7 years ago
Alternatives and similar repositories for binarymutation
Users that are interested in binarymutation are comparing it to the libraries listed below
Sorting:
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- The central ASPIRE framework repository, start here if you want to use our tools (this contains all tools and documentation)☆13Apr 17, 2021Updated 4 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- CRETE under development☆60Jun 30, 2020Updated 5 years ago
- Clang SA checkers developed as part of the Melange framework☆17Nov 30, 2015Updated 10 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Nov 3, 2018Updated 7 years ago
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- ☆21Feb 15, 2022Updated 4 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- IDA Pro processor module for Altera Nios II Classic/Gen2 microprocessor architecture☆32Sep 26, 2023Updated 2 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- ☆25May 27, 2025Updated 9 months ago
- Common dependency management for various Trail of Bits C++ codebases☆35Jun 17, 2024Updated last year
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- ☆23May 19, 2019Updated 6 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- ☆25Feb 21, 2019Updated 7 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- ☆67May 5, 2021Updated 4 years ago
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆63Dec 23, 2016Updated 9 years ago
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Sep 16, 2022Updated 3 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Jan 2, 2020Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆34Mar 4, 2024Updated last year
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- ☆34May 4, 2020Updated 5 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- ☆37Jun 1, 2022Updated 3 years ago