agra-uni-bremen / BinSymLinks
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
☆52Updated 5 months ago
Alternatives and similar repositories for BinSym
Users that are interested in BinSym are comparing it to the libraries listed below
Sorting:
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆53Updated 5 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆63Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Python bindings for BochsCPU☆37Updated 2 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated last week
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆20Updated last year
- Program synthesis tools and utilities for LLVM.☆20Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- Example of an ELF parser to learn about the ELF format☆10Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆24Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆83Updated 2 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated last month
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated 11 months ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- binary ninja related code☆37Updated 6 months ago
- ☆59Updated 2 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- ☆24Updated 10 months ago
- ☆31Updated 5 years ago
- ☆58Updated 3 months ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- ☆75Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Updated last year