arnaugamez / r2syntiaLinks
Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.
☆21Updated 4 years ago
Alternatives and similar repositories for r2syntia
Users that are interested in r2syntia are comparing it to the libraries listed below
Sorting:
- ☆31Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Plugins for IDA Pro and Hex-Rays☆41Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆53Updated 5 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- ARMv7 architecture plugin☆40Updated last year
- ☆24Updated 9 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- A collection of Binary Ninja plugins☆25Updated 3 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 8 months ago
- An Integrity-Check Monitoring Pintool☆57Updated 4 years ago
- x86/x64 architecture plugin☆39Updated last year
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- An IDA plugin that allows you call IDA python APIs from remote.☆15Updated 2 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆30Updated 4 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- ☆34Updated 3 years ago
- IDA plugin CMake build-script☆34Updated 7 months ago
- Windbg extension that allows you analyze Control Flow Guard map☆35Updated 3 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆21Updated 3 years ago
- ☆76Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 6 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- Create and use macros in IDA's CLIs☆64Updated 2 years ago
- Slightly better IDA code folding☆14Updated 5 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- LLVM based devirtualization PoC’s.☆20Updated 3 years ago