CFG explorer for binaries
☆85Oct 29, 2024Updated last year
Alternatives and similar repositories for cfg-explorer
Users that are interested in cfg-explorer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆45Mar 13, 2022Updated 4 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- ☆27Mar 16, 2023Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆300Mar 15, 2019Updated 7 years ago
- CFG explorer for binaries☆39Oct 29, 2024Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Jun 17, 2024Updated last year
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- An RNN-based framework to evade opensource anti-virus which is also deep learning-based. E.g., MalConv and Non-Negative MalConv.☆13Jun 4, 2020Updated 5 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆27Jun 6, 2023Updated 2 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Oct 1, 2021Updated 4 years ago
- A collection of POP exploits.☆30Feb 22, 2021Updated 5 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- A simple IDA Pro plugin to show all HexRays decompiler comments written by user☆23Sep 3, 2021Updated 4 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆133Jan 9, 2018Updated 8 years ago
- ☆20May 27, 2020Updated 5 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- angr's exploration technique to perform taint analysis☆63Mar 26, 2020Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Jan 23, 2022Updated 4 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago
- ☆189Mar 21, 2025Updated last year