☆71Jul 24, 2025Updated 8 months ago
Alternatives and similar repositories for binpool
Users that are interested in binpool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated 11 months ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 4 months ago
- ☆65Dec 17, 2025Updated 3 months ago
- ☆32Jul 22, 2023Updated 2 years ago
- IoT firmware vulnerability analysis tool based on binary code similarity analysis (BCSA)☆23Jul 6, 2022Updated 3 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆155Mar 9, 2026Updated 2 weeks ago
- Practical Data-Only Attack Generation☆44Jun 7, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 4 months ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆41Mar 9, 2026Updated 2 weeks ago
- Program analysis tools built on tree-sitter (https://github.com/tree-sitter/tree-sitter).☆62Nov 24, 2025Updated 4 months ago
- A structured fuzzing framework built in Rust☆31Oct 10, 2022Updated 3 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆60May 20, 2025Updated 10 months ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- ☆13Jan 7, 2025Updated last year
- ☆69Jun 21, 2024Updated last year
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆83Dec 10, 2024Updated last year
- ShiftLeft Scan is a free and open-source commercial-grade security tool for modern DevOps teams.☆13Dec 30, 2022Updated 3 years ago
- Slides about HyperDbg☆39Feb 11, 2026Updated last month
- Source code for the DEF CON 33 CTF Finals.☆26Aug 26, 2025Updated 6 months ago
- Official code for kTrans: Knowledge-Aware Transformer for Binary Code Embedding☆30Dec 17, 2023Updated 2 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- ☆59Jan 8, 2026Updated 2 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆799Mar 9, 2026Updated 2 weeks ago
- Cross-Architecture Function Similarity Search Model - https://arxiv.org/abs/2310.03605☆14Oct 6, 2023Updated 2 years ago
- A tool for analyzing syntactic and semantic properties of C Preprocessor macros in C programs☆12Aug 27, 2025Updated 6 months ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆121Feb 25, 2026Updated last month
- ☆12Oct 29, 2015Updated 10 years ago
- ☆16May 15, 2021Updated 4 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 3 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49May 28, 2024Updated last year
- ☆27Dec 29, 2024Updated last year
- Binary Code Similarity Analysis (BCSA) Tool☆125May 18, 2025Updated 10 months ago