agra-uni-bremen / BinSymLinks
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
☆50Updated 3 months ago
Alternatives and similar repositories for BinSym
Users that are interested in BinSym are comparing it to the libraries listed below
Sorting:
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆52Updated 3 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆63Updated last year
- Python bindings for BochsCPU☆37Updated last month
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆20Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last week
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆36Updated last week
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- Program synthesis tools and utilities for LLVM.☆20Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆31Updated 5 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 10 months ago
- Linux kernel branches for confidential compute research☆18Updated 5 months ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆82Updated 2 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Updated 2 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- binary ninja related code☆36Updated 5 months ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 2 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- Spectre based on Linear Address Masking☆69Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆24Updated last year
- Example of an ELF parser to learn about the ELF format☆10Updated 11 months ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆33Updated last year
- weggli ruleset scanner for source code and binaries☆30Updated 3 months ago
- ☆58Updated 2 years ago