Binary Ninja Plugin for Generating Callgraphs
☆17Jun 17, 2025Updated 9 months ago
Alternatives and similar repositories for bncallgraph
Users that are interested in bncallgraph are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some Rust bindings for Binary Ninja☆31Oct 4, 2023Updated 2 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆69Nov 24, 2021Updated 4 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- An approximate solver for concolic execution☆22Apr 29, 2025Updated 10 months ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 14 years ago
- convert VMWare and VirtualBox VM files to QEMU-KVM VM disk files☆10Jul 27, 2020Updated 5 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆14Sep 11, 2021Updated 4 years ago
- This repository contains the currently implemented angr concrete targets.☆34Sep 1, 2023Updated 2 years ago
- ☆32Jun 13, 2023Updated 2 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- A CircuitPython-powered scoreboard to measure hand sanitizer dispensing over MQTT☆10Oct 27, 2020Updated 5 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- Binary Ninja Call Graph plugin☆24Apr 20, 2022Updated 3 years ago
- A binary ninja plugin that finds format string vulnerabilities☆25Sep 29, 2020Updated 5 years ago
- Collection of LLVM passes and triage tools for use with the KRF fuzzer☆38Oct 12, 2022Updated 3 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- ☆10Sep 5, 2022Updated 3 years ago
- A data-flow-guided fuzzer☆124Aug 19, 2023Updated 2 years ago
- KiCad designs for Infineon SLB9665 and SLB9670 based TPM modules.☆11Aug 29, 2021Updated 4 years ago
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- AMD SVM hypervisor rootkit proof of concept☆49Sep 23, 2023Updated 2 years ago
- Source code for GpuShareSat, a library for SAT solvers to use the GPU for clause sharing between CPU threads.☆34Jun 8, 2021Updated 4 years ago
- Recreated gerbers for the Supermicro X11SSH-F motherboard.☆16Aug 2, 2023Updated 2 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆19Dec 29, 2023Updated 2 years ago
- ☆21Sep 10, 2024Updated last year
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Lazy Bloodhound is a toy PHP static code analyzer built on tree-sitter☆13Feb 19, 2021Updated 5 years ago
- Frida-based general purpose fuzzer☆221Aug 13, 2020Updated 5 years ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 2 years ago
- Android Debug Utility Suite☆17Apr 19, 2015Updated 10 years ago
- ☆13Aug 24, 2022Updated 3 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆65Aug 11, 2021Updated 4 years ago
- Windows Heap Loggin'☆11Aug 12, 2020Updated 5 years ago