agra-uni-bremen / BinSymLinks
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
☆50Updated 2 months ago
Alternatives and similar repositories for BinSym
Users that are interested in BinSym are comparing it to the libraries listed below
Sorting:
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆51Updated 3 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Python bindings for BochsCPU☆37Updated 2 weeks ago
- Python interface for Binexport, the Bindiff export format☆17Updated last week
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆36Updated last week
- Example of an ELF parser to learn about the ELF format☆10Updated 10 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆62Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆24Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 9 months ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆35Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆30Updated last week
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆18Updated last year
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆43Updated 4 years ago
- ☆58Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 2 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆33Updated last year
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- binary ninja related code☆36Updated 4 months ago
- Intel Management Engine JTAG Proof of Concept - 2022 Instructions☆33Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- A simple example of using Windows Hypervisor Platform (WHP)☆11Updated 4 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆25Updated 5 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year