SoftwareSecurityLab / UbSym
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
☆43Updated last year
Alternatives and similar repositories for UbSym:
Users that are interested in UbSym are comparing it to the libraries listed below
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆14Updated this week
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Updated 2 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 2 years ago
- ☆40Updated 3 years ago
- ☆29Updated 4 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Python bindings for BochsCPU☆35Updated this week
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last month
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆26Updated last year
- IDA (sort of) headless☆22Updated last year
- Ghidra plugin that adds a window showing the high P-code for the current function.☆15Updated last year
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆43Updated last month
- A Linux x86/x86-64 tool to trace registers and memory regions.☆35Updated 2 years ago
- ☆24Updated 3 years ago
- ☆13Updated last week
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated last year
- Here I store my proof of concepts☆14Updated 5 months ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- javascript extension of windbg for hacker.☆15Updated last year
- ☆11Updated 4 months ago
- ☆32Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆16Updated last year
- Reverse engineered API for Microsoft's Time Travel Debugger☆32Updated 10 months ago