agra-uni-bremen / BinSym
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
☆46Updated 3 months ago
Alternatives and similar repositories for BinSym:
Users that are interested in BinSym are comparing it to the libraries listed below
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Python bindings for BochsCPU☆35Updated last month
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 3 years ago
- Example of an ELF parser to learn about the ELF format☆10Updated 6 months ago
- A tool to perform so called BGE attack☆24Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- A symbolic execution engine for LLVM IR☆51Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆27Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated last week
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆11Updated last month
- binary ninja related code☆35Updated 3 weeks ago
- ☆18Updated 3 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- weggli ruleset scanner for source code and binaries☆28Updated 4 months ago
- SMT Modeling for Ghidra's PCODE☆24Updated last week
- Common format for transferring and applying function information across binary analysis tools☆33Updated 4 months ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆30Updated last week
- Symbolic executor for Binary Ninja's MLIL☆22Updated 6 months ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆19Updated last month
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆31Updated 2 months ago
- Linux kernel branches for confidential compute research☆17Updated 3 weeks ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- AIL: The angr Intermediate Language.☆32Updated this week
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- Ghidra Sleight (PCode) parsing library in Rust.☆43Updated 3 months ago
- ☆31Updated 4 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆40Updated last year
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆30Updated this week