SoftwareSecurityLab / UbSym
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
☆43Updated last year
Alternatives and similar repositories for UbSym:
Users that are interested in UbSym are comparing it to the libraries listed below
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- ☆21Updated last year
- ☆24Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆14Updated last month
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- IDA (sort of) headless☆24Updated last year
- ☆18Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- Python bindings for BochsCPU☆35Updated last month
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last month
- ☆40Updated 3 years ago
- Here I store my proof of concepts☆14Updated 6 months ago
- ☆11Updated 5 months ago
- Ghidra plugin that adds a window showing the high P-code for the current function.☆15Updated 2 years ago
- Binary Ninja Call Graph plugin☆20Updated 2 years ago
- ☆32Updated last year
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- ☆20Updated 6 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆30Updated 4 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago