agra-uni-bremen / BinSym
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
☆46Updated 3 months ago
Alternatives and similar repositories for BinSym
Users that are interested in BinSym are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Linux kernel branches for confidential compute research☆17Updated last month
- Python bindings for BochsCPU☆35Updated 2 months ago
- breaking decompilers☆16Updated this week
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- binary ninja related code☆35Updated last month
- Python interface for Binexport, the Bindiff export format☆16Updated 3 weeks ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 3 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆55Updated 3 years ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆33Updated this week
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆31Updated last week
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- transpile llil to c++ for execution and testing☆42Updated last year
- ☆31Updated 4 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆23Updated 10 months ago
- ☆37Updated 2 weeks ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆40Updated last year
- AIL: The angr Intermediate Language.☆32Updated last week
- ☆18Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆31Updated 3 months ago
- Decode machine code into VEX IR and translate into LLVM IR☆27Updated 5 years ago
- SMT Modeling for Ghidra's PCODE☆25Updated this week
- weggli ruleset scanner for source code and binaries☆29Updated 4 months ago
- A tool to perform so called BGE attack☆24Updated last year
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- ☆29Updated 4 years ago
- Mixed Boolean Arithmetic Simplification using E-Graphs☆20Updated last week