Xenios91 / GlyphLinks
An architecture independent binary analysis tool for fingerprinting functions through NLP
☆13Updated 4 months ago
Alternatives and similar repositories for Glyph
Users that are interested in Glyph are comparing it to the libraries listed below
Sorting:
- tool for multi-execution jump coverage introspection☆66Updated 7 months ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- ☆38Updated 5 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated 3 weeks ago
- ☆31Updated 4 months ago
- ☆66Updated 10 months ago
- ☆18Updated 3 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆45Updated 5 years ago
- ☆21Updated last year
- Binary Ninja Plugin for Generating Callgraphs☆17Updated 2 months ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆32Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- Python GUI for seeing what's happening inside a fuzzer☆26Updated 3 years ago
- Use Ghidra Structs in Python☆30Updated 4 years ago
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- ☆18Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆47Updated last year
- A Ghidra plugin for locating object file boundaries.☆123Updated 8 months ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆70Updated 11 months ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆84Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year