The toolchain of Chosen-instruction attack
☆21May 3, 2022Updated 3 years ago
Alternatives and similar repositories for CIA-toolchain
Users that are interested in CIA-toolchain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆39Apr 3, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆23Dec 3, 2021Updated 4 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆168Feb 16, 2025Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 6 years ago
- HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Ap…☆22Jul 6, 2021Updated 4 years ago
- ☆22Mar 23, 2016Updated 10 years ago
- sample bypass anti-anti-debug tool by race condition☆28Aug 2, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Program synthesis tools and utilities for LLVM.☆20Jul 6, 2023Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- VMLifter 是一个基于指令执行轨迹的语义提升工具,专注于值依赖驱动的程序语义重建。☆45Mar 9, 2026Updated 2 weeks ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- APK For Dumping Memory libil2cpp.so / libUE4.so from memory☆15Sep 3, 2021Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆75Aug 6, 2021Updated 4 years ago
- fuzzing for config☆12Sep 15, 2020Updated 5 years ago
- PoC code for IsValidImageCRC()☆22May 3, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- Fuzzing framework for Robot Operating System (ROS) and ROS-based robotic systems☆36Jul 7, 2025Updated 8 months ago
- ☆59Jan 27, 2023Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Apr 26, 2021Updated 4 years ago
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Oct 13, 2022Updated 3 years ago
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆355Feb 2, 2026Updated last month
- All materials related https://resources.infosecinstitute.com/tutorial-building-reverse-engineering-simple-virtual-machine-protection/☆56May 4, 2017Updated 8 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Tool for generating regression tests☆15Mar 24, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Hyper-V VMBusPipe Reversing☆23May 10, 2021Updated 4 years ago
- Synthesis from Inductive specification eMpowered by Bidirectional Abstract Interpretation☆22Dec 3, 2023Updated 2 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- ☆146Oct 26, 2024Updated last year
- ☆16Aug 22, 2019Updated 6 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago