SoftwareSecurityLab / UbSymLinks
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
☆42Updated 2 years ago
Alternatives and similar repositories for UbSym
Users that are interested in UbSym are comparing it to the libraries listed below
Sorting:
- Python bindings for BochsCPU☆37Updated 2 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆19Updated 3 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Updated 4 years ago
- Python interface for Binexport, the Bindiff export format☆15Updated last month
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- binary ninja related code☆37Updated 6 months ago
- ☆30Updated 4 years ago
- javascript extension of windbg for hacker.☆16Updated 2 years ago
- ☆32Updated 2 years ago
- ☆38Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆31Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- ☆19Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Updated last year
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆51Updated 4 months ago
- Here I store my proof of concepts☆14Updated last year
- IDA (sort of) headless☆26Updated last year
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- poc code for CVE-2024-38080☆29Updated last year