agra-uni-bremen / BinSymLinks
Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model
☆54Updated 8 months ago
Alternatives and similar repositories for BinSym
Users that are interested in BinSym are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 8 months ago
- Artifact of "Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor" [USENIX Security 2024]☆64Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆19Updated last month
- Python bindings for BochsCPU☆37Updated 5 months ago
- ☆59Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆38Updated last week
- Binary Ninja plugin for visualizing coverage over time☆25Updated 4 years ago
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆88Updated 2 years ago
- Program synthesis tools and utilities for LLVM.☆20Updated 2 years ago
- ☆45Updated 4 years ago
- ☆27Updated last year
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Updated last year
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- weggli ruleset scanner for source code and binaries☆37Updated 2 months ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- A tool to perform so called BGE attack☆26Updated 7 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆51Updated last year
- Example of an ELF parser to learn about the ELF format☆10Updated last year
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Updated 3 years ago
- Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor☆21Updated last year
- Spectre based on Linear Address Masking☆68Updated 2 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 3 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆43Updated 2 years ago
- ☆16Updated this week
- Xyntia, the black-box deobfuscator☆86Updated last month
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated 2 years ago