USECAP / dreamLinks
☆20Updated 7 years ago
Alternatives and similar repositories for dream
Users that are interested in dream are comparing it to the libraries listed below
Sorting:
- ☆10Updated 7 years ago
- LLVM meets Code Property Graphs☆96Updated 4 years ago
- A binary to LLVM translator☆150Updated 7 years ago
- Collection of various llvm passes☆129Updated 10 years ago
- transpile llil to c++ for execution and testing☆46Updated 2 years ago
- Scalable Validator for Binary Lifters☆61Updated 5 years ago
- BinRec: Dynamic Binary Lifting and Recompilation☆145Updated 2 years ago
- Library for Capstone instruction to LLVM IR translation☆47Updated 8 years ago
- An approximate solver for concolic execution☆21Updated 8 months ago
- ☆32Updated 3 years ago
- QuarkslaB Dynamic Linker library☆90Updated last year
- Aarch64 architecture plugin☆85Updated last year
- Tutorial to write qemu plugins☆34Updated 8 years ago
- ☆74Updated last year
- Binary Translator to LLVM IR☆48Updated 8 years ago
- How to use LLVM passes☆36Updated 3 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- ☆31Updated 5 years ago
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- A LLVM Pass with runtime dataflow sanitization☆32Updated 6 years ago
- SMT Modeling for Ghidra's PCODE☆32Updated 3 weeks ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Updated 4 years ago
- UNMAINTAINED: I am now developing and using https://github.com/GhidraJupyter/ghidra-jupyter-kotlin instead, PRs still welcome☆16Updated 5 years ago
- Driver Security Analyzer☆53Updated 5 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated 2 months ago
- Futile attempt to solve the Tigress challenges using angr☆22Updated 6 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago