The toolchain of Chosen-instruction attack
☆21May 3, 2022Updated 3 years ago
Alternatives and similar repositories for CIA-toolchain
Users that are interested in CIA-toolchain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆39Apr 3, 2020Updated 6 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- An Empirical Study of AI Techniques in Mobile Applications☆12May 28, 2024Updated last year
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆23Dec 3, 2021Updated 4 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- ☆18Sep 7, 2025Updated 7 months ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆57Jan 16, 2020Updated 6 years ago
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆170Feb 16, 2025Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆22Mar 23, 2016Updated 10 years ago
- sample bypass anti-anti-debug tool by race condition☆28Aug 2, 2022Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- LLVM 2.9 branch with TI C64x backend.☆11Oct 17, 2019Updated 6 years ago
- VMLifter 是一个基于指令执行轨迹的语义提升工具,专注于值依赖驱动的程序语义重建 。☆50Mar 9, 2026Updated last month
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- APK For Dumping Memory libil2cpp.so / libUE4.so from memory☆15Sep 3, 2021Updated 4 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆74Aug 6, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PoC code for IsValidImageCRC()☆22May 3, 2023Updated 2 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- Fuzzing framework for Robot Operating System (ROS) and ROS-based robotic systems☆36Jul 7, 2025Updated 9 months ago
- ☆58Jan 27, 2023Updated 3 years ago
- obfuscation that aims to not stand out☆25Mar 27, 2022Updated 4 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Apr 26, 2021Updated 4 years ago
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Oct 13, 2022Updated 3 years ago
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆359Feb 2, 2026Updated 2 months ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- All materials related https://resources.infosecinstitute.com/tutorial-building-reverse-engineering-simple-virtual-machine-protection/☆56May 4, 2017Updated 8 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Tool for generating regression tests☆15Mar 24, 2023Updated 3 years ago
- Hyper-V VMBusPipe Reversing☆26May 10, 2021Updated 4 years ago
- Synthesis from Inductive specification eMpowered by Bidirectional Abstract Interpretation☆22Dec 3, 2023Updated 2 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago