SoftwareSecurityLab / UbSym
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
☆43Updated last year
Related projects ⓘ
Alternatives and complementary repositories for UbSym
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆14Updated 4 months ago
- Output high level Pcode (PcodeAST) in Ghidra☆15Updated last year
- Uncovering Container Confusion in the Linux Kernel☆43Updated 8 months ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 2 years ago
- ☆39Updated 3 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆42Updated 4 months ago
- Python bindings for BochsCPU☆34Updated last month
- ☆30Updated last year
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆22Updated last year
- ☆24Updated 3 years ago
- ☆17Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆35Updated 2 years ago
- ☆20Updated last year
- ☆30Updated 4 years ago
- ☆19Updated last year
- IDA (sort of) headless☆20Updated 9 months ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆24Updated 5 months ago
- ☆19Updated 2 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆22Updated 7 months ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆19Updated 2 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆13Updated last year
- Ghidra plugin that adds a window showing the high P-code for the current function.☆14Updated last year
- ☆27Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago