☆72Jul 24, 2025Updated 9 months ago
Alternatives and similar repositories for binpool
Users that are interested in binpool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated last year
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated 2 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 5 months ago
- ☆67Dec 17, 2025Updated 4 months ago
- ☆32Jul 22, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆24Jul 6, 2022Updated 3 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆156Apr 3, 2026Updated last month
- Practical Data-Only Attack Generation☆45Jun 7, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago
- A tool for finding instruction-level equivalence between two functions.☆13Aug 26, 2025Updated 8 months ago
- weggli ruleset scanner for source code and binaries☆40Nov 16, 2025Updated 5 months ago
- A list of data-only attacks☆21Aug 22, 2025Updated 8 months ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆43Apr 6, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Program analysis tools built on tree-sitter (https://github.com/tree-sitter/tree-sitter).☆64Nov 24, 2025Updated 5 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 4 months ago
- A structured fuzzing framework built in Rust☆31Oct 10, 2022Updated 3 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆61May 20, 2025Updated 11 months ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- ☆13Jan 7, 2025Updated last year
- ☆73Jun 21, 2024Updated last year
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year
- Slides about HyperDbg☆39Feb 11, 2026Updated 2 months ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- ☆62Jan 8, 2026Updated 3 months ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆15Apr 22, 2026Updated last week
- A collection of my Semgrep rules to facilitate vulnerability research.☆811Apr 12, 2026Updated 3 weeks ago
- Source code for the DEF CON 33 CTF Finals.☆28Aug 26, 2025Updated 8 months ago
- A tool for analyzing syntactic and semantic properties of C Preprocessor macros in C programs☆12Aug 27, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆121Feb 25, 2026Updated 2 months ago
- ☆16May 15, 2021Updated 4 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 4 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49May 28, 2024Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 11 months ago