agra-uni-bremen / BinSymLinks
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
☆54Updated 6 months ago
Alternatives and similar repositories for BinSym
Users that are interested in BinSym are comparing it to the libraries listed below
Sorting:
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 7 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated last month
- Python bindings for BochsCPU☆37Updated 4 months ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆19Updated last week
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Program synthesis tools and utilities for LLVM.☆20Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆86Updated 2 years ago
- ☆26Updated last year
- ☆45Updated 4 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Spectre based on Linear Address Masking☆67Updated 2 years ago
- ☆59Updated 2 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Updated 3 years ago
- Example of an ELF parser to learn about the ELF format☆10Updated last year
- A tool to perform so called BGE attack☆25Updated 6 months ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Updated last year
- binary ninja related code☆37Updated 8 months ago
- weggli ruleset scanner for source code and binaries☆35Updated last month
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- ☆61Updated 5 months ago
- Linux kernel branches for confidential compute research☆20Updated 8 months ago
- ☆74Updated last year
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated 2 years ago
- ☆76Updated last year