SystemSecurityStorm / Awesome-Binary-RewritingLinks
An awesome & curated list of binary rewriting papers
☆247Updated 3 years ago
Alternatives and similar repositories for Awesome-Binary-Rewriting
Users that are interested in Awesome-Binary-Rewriting are comparing it to the libraries listed below
Sorting:
- ☆144Updated 9 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆260Updated 5 months ago
- SymQEMU: Compilation-based symbolic execution for binaries☆351Updated 2 months ago
- The fastest Intel-PT decoder for fuzzing☆373Updated last year
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆225Updated 5 years ago
- A LLVM Sanitizer for Symbolic Tracing☆223Updated 3 weeks ago
- S2E: A platform for multi-path program analysis with selective symbolic execution.☆480Updated 7 months ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆178Updated 3 years ago
- BinRec: Dynamic Binary Lifting and Recompilation☆140Updated last year
- USENIX 2021 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types☆202Updated 3 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆113Updated 8 months ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆198Updated this week
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- Symbolic Execution Over Processor Traces☆122Updated 11 months ago
- Intermediate Representation for Binary analysis and transformation☆341Updated 3 weeks ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆126Updated this week
- Source code of ASAN--☆95Updated last year
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Linux Kernel Fuzzer Corpus☆144Updated this week
- A grammar-based custom mutator for AFL++☆256Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆104Updated 2 months ago
- sleigh craft!☆254Updated 3 years ago
- Kernel fuzzer inspired by Syzkaller.☆280Updated 3 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- Recent symbolic execution papers and tools.☆170Updated 2 months ago
- ☆230Updated last year
- A data-flow-guided fuzzer☆122Updated last year
- Binary Code Similarity Analysis (BCSA) Benchmark☆158Updated last year
- An IntelliJ IDEA plugin for working on Ghidra Extensions.☆98Updated last year
- Produce code coverage results with gcov from afl-fuzz test cases☆85Updated 7 months ago