Supporting Materials for “Symbolic Triage” blog post
☆24Oct 31, 2022Updated 3 years ago
Alternatives and similar repositories for SymbolicTriagePost
Users that are interested in SymbolicTriagePost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jun 20, 2022Updated 3 years ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Jul 17, 2024Updated last year
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Virtual Tagger Plugin is a Cutter plugin that significantly improves handling and analysis of vtables and virtual functions☆16Mar 23, 2023Updated 3 years ago
- LLVM Without The ROP Gadgets!☆25Jan 9, 2024Updated 2 years ago
- Generate Rust Emulators and Disassemblers from Ghidra Sleigh.☆17Jul 18, 2023Updated 2 years ago
- Dr. Disassembler☆38Jan 5, 2022Updated 4 years ago
- a tiny, wasm-ready virtual machine - stupidly fast☆38Dec 2, 2025Updated 3 months ago
- ☆19Dec 28, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An open-source interactive visualization tool for comparing IR CFGs☆91Jul 13, 2025Updated 8 months ago
- Binsec/Rel is an extension of Binsec that implements relational symbolic execution for constant-time verification and secret-erasure at b…☆35Jan 25, 2025Updated last year
- ☆39Sep 27, 2022Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- ☆45Apr 12, 2022Updated 3 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆39Apr 3, 2020Updated 5 years ago
- LLVM Abstraction & Refinement Tool. The goal of this tool is to provide LLVM-to-LLVM transformations that implement various program abstr…☆19Mar 17, 2023Updated 3 years ago
- ☆187Nov 29, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆82Nov 14, 2022Updated 3 years ago
- A demontration of disassemblers generated by sleigh2rust☆13Nov 25, 2024Updated last year
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- White-box analytic framework based on LLVM☆38Jun 10, 2019Updated 6 years ago
- Fuzzing Embedded Systems using Hardware Breakpoints☆192Nov 27, 2023Updated 2 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆32Apr 10, 2021Updated 4 years ago
- Tantō slices functions into more consumable chunks☆80Dec 8, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Find RSA primes in files☆20May 14, 2022Updated 3 years ago
- Program analysis tools developed at Draper on the CBAT project.☆106Apr 13, 2023Updated 2 years ago
- Binary-only fuzzer for WebAssembly (WASI)☆52Jul 31, 2024Updated last year
- Windows kernel PDB data parsed into YAML☆42Nov 2, 2025Updated 4 months ago
- Symbolic execution engine for Whitespace.☆13May 30, 2021Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago