chosen-instruction-attack / CIA-toolchain
The toolchain of Chosen-instruction attack
☆18Updated 2 years ago
Alternatives and similar repositories for CIA-toolchain:
Users that are interested in CIA-toolchain are comparing it to the libraries listed below
- ☆40Updated 4 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆61Updated 3 years ago
- This repo contains the tests and results that were done during the research of SATURN☆38Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- ☆44Updated 7 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆70Updated last year
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- ☆30Updated 11 months ago
- Library for Capstone instruction to LLVM IR translation☆45Updated 7 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆14Updated 3 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 6 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆27Updated 5 years ago
- obfuscation that aims to not stand out☆23Updated 3 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆35Updated 5 years ago
- ☆23Updated 2 months ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆40Updated last year
- ☆13Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- WinAFL modified for RDP client fuzzing☆19Updated 2 years ago
- nanoMIPS IDA plugin☆67Updated 3 years ago
- Binary Ninja plugin for forward/backward slicing☆18Updated 4 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- An IDA processor for eBPF bytecode☆47Updated 3 years ago
- Debug IDAPython in VSCode☆25Updated 2 years ago
- Raw IDA Kernel API for IDAPython☆33Updated 3 years ago
- Toy LLVM obfuscator pass☆72Updated 3 years ago
- Symbolic Execution Over Processor Traces☆120Updated 8 months ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆102Updated 3 years ago
- ☆11Updated 5 years ago