caps-tum / dbrewLinks
A library for dynamic binary rewriting
☆58Updated 4 years ago
Alternatives and similar repositories for dbrew
Users that are interested in dbrew are comparing it to the libraries listed below
Sorting:
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- Dr. Disassembler☆36Updated 3 years ago
- ☆31Updated 5 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38Updated 5 years ago
- Extracting high level semantic information from binary code☆66Updated 6 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆25Updated 5 years ago
- TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semanticall…☆29Updated 4 years ago
- Pretty printer from GTIRB to assembly code☆49Updated 2 weeks ago
- ☆44Updated 4 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Updated 3 years ago
- x86/x64 architecture plugin☆40Updated last year
- TracerX Symbolic Virtual Machine☆33Updated 2 weeks ago
- Scalable Validator for Binary Lifters☆57Updated 5 years ago
- Diablo is a retargetable link-time binary rewriting framework☆78Updated 4 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Updated 3 years ago
- ☆30Updated 4 years ago
- ☆51Updated 3 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Binary Deobfuscation Series☆21Updated 5 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆25Updated 5 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- Dynamic Control Flow Recovery☆24Updated 7 years ago
- X86 disassembler benchmark☆61Updated last year
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago