☆71Jul 24, 2025Updated 7 months ago
Alternatives and similar repositories for binpool
Users that are interested in binpool are comparing it to the libraries listed below
Sorting:
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated 10 months ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆155Jan 14, 2026Updated last month
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 3 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated 2 months ago
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- ☆64Dec 17, 2025Updated 2 months ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆23Jul 6, 2022Updated 3 years ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 3 months ago
- A tool for analyzing syntactic and semantic properties of C Preprocessor macros in C programs☆12Aug 27, 2025Updated 6 months ago
- Binary Ninja Plugin for RISC-V☆14Nov 29, 2023Updated 2 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Collect crash (or UndefinedBehaviorSanitizer error) reports, triage, and estimate severity.☆347Dec 3, 2025Updated 3 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Aug 3, 2025Updated 7 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59May 20, 2025Updated 9 months ago
- ☆39Dec 31, 2025Updated 2 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆798Feb 17, 2026Updated 2 weeks ago
- ☆10Jan 3, 2023Updated 3 years ago
- gradient-based symbolic execution engine implemented from scratch☆37Dec 16, 2023Updated 2 years ago
- Program analysis tools built on tree-sitter (https://github.com/tree-sitter/tree-sitter).☆62Nov 24, 2025Updated 3 months ago
- ☆32Jul 22, 2023Updated 2 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated 3 weeks ago
- Source code for the DEF CON 33 CTF Finals.☆25Aug 26, 2025Updated 6 months ago
- ☆13Jan 7, 2025Updated last year
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- VMF is a modular fuzzer that is easily reconfigurable to use many different capabilities and approaches. Also includes a web-based distri…☆38Aug 27, 2025Updated 6 months ago
- A structured fuzzing framework built in Rust☆31Oct 10, 2022Updated 3 years ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆113Feb 25, 2026Updated last week
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆12Oct 29, 2015Updated 10 years ago
- ☆15Mar 13, 2021Updated 4 years ago
- Exploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476)☆19Jun 20, 2023Updated 2 years ago
- Finding security vulnerabilities with CodeQL in C/C++☆13Mar 25, 2021Updated 4 years ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago