Xenios91 / GlyphLinks
An architecture independent binary analysis tool for fingerprinting functions through NLP
☆12Updated 2 months ago
Alternatives and similar repositories for Glyph
Users that are interested in Glyph are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Updated last week
- Ghidra's development plugins, scripts, contributing. Presentation☆12Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆34Updated 2 weeks ago
- Python interface for Binexport, the Bindiff export format☆17Updated 2 weeks ago
- A tool to interactively explore the heap of a python process☆25Updated 4 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- tool for multi-execution jump coverage introspection☆65Updated 5 months ago
- Ghidra analyzer for UEFI firmware.☆19Updated 2 years ago
- ☆31Updated 4 years ago
- ☆31Updated 2 months ago
- Binary Ninja Call Graph plugin☆22Updated 3 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆32Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Updated 7 years ago
- Code snippets for Binary Ninja's Python API☆28Updated 4 years ago
- ☆38Updated 4 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆68Updated 3 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- A tool to perform so called BGE attack☆24Updated 2 weeks ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆17Updated 2 years ago
- Signature libraries for Binary Ninja☆15Updated 5 years ago
- Use Ghidra Structs in Python☆30Updated 4 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Collection of images and examples to use with Shoggoth.☆19Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- ☆21Updated last year