binaryai / bindiffmatchLinks
☆92Updated last year
Alternatives and similar repositories for bindiffmatch
Users that are interested in bindiffmatch are comparing it to the libraries listed below
Sorting:
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆90Updated 2 years ago
- Automatic Exploit Generation Paper☆88Updated 3 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 4 years ago
- ☆34Updated 3 years ago
- ☆93Updated last year
- ☆102Updated 4 years ago
- some ida script☆34Updated 4 years ago
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆34Updated 2 weeks ago
- ☆118Updated last year
- AFLNW: network wrapper for AFL☆46Updated last year
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- a simple method to get v8 source code with github action☆78Updated 2 years ago
- ☆30Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Updated 6 years ago
- Debug pwn in docker, no need for virtual machines☆36Updated 3 years ago
- IDA Hexrays To Joern☆41Updated 10 months ago
- ☆80Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆122Updated 3 months ago
- A tool for automatically identifying syscall-guard variables☆34Updated 4 months ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 2 years ago
- gdb plugin for linux kernel to debug slub☆52Updated 5 years ago
- ☆230Updated last year
- Source-binary patch presence test system.☆84Updated 3 years ago
- B2SFinder is a binary-to-source matching tool for OSS reuse detection on COTS software. This project contains the core code of B2SFinder …☆57Updated 6 years ago
- The learn note of Angr-CTF ..☆48Updated 6 years ago
- CCF推荐会议论文的获取和推送☆16Updated last year
- ☆40Updated last month
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆45Updated 2 years ago