chosen-instruction-attack / CIA-toolchainView external linksLinks
The toolchain of Chosen-instruction attack
☆21May 3, 2022Updated 3 years ago
Alternatives and similar repositories for CIA-toolchain
Users that are interested in CIA-toolchain are comparing it to the libraries listed below
Sorting:
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Nov 12, 2019Updated 6 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆23Dec 3, 2021Updated 4 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆39Apr 3, 2020Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Aug 6, 2021Updated 4 years ago
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- Program synthesis tools and utilities for LLVM.☆20Jul 6, 2023Updated 2 years ago
- APK For Dumping Memory libil2cpp.so / libUE4.so from memory☆16Sep 3, 2021Updated 4 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- Zyrox: LLVM based, compile-time obfuscator plugin.☆84Feb 1, 2026Updated last week
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆166Feb 16, 2025Updated 11 months ago
- HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Ap…☆22Jul 6, 2021Updated 4 years ago
- obfuscation that aims to not stand out☆23Mar 27, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated 3 weeks ago
- sample bypass anti-anti-debug tool by race condition☆27Aug 2, 2022Updated 3 years ago
- ☆23Mar 13, 2023Updated 2 years ago
- Synthesis of loop-free programs☆24Feb 7, 2026Updated last week
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆39Jan 22, 2026Updated 3 weeks ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- Python library that provides methods for Boolean circuit manipulation, analysis, and synthesis☆32Jan 25, 2026Updated 2 weeks ago
- All materials related https://resources.infosecinstitute.com/tutorial-building-reverse-engineering-simple-virtual-machine-protection/☆55May 4, 2017Updated 8 years ago
- Port of MBA Solver SiMBA to C/C++ (MBA deobfuscation in real world applications)☆106Nov 5, 2025Updated 3 months ago
- ☆144Oct 26, 2024Updated last year
- ☆59Jan 27, 2023Updated 3 years ago
- VMProtect analysis script☆56Mar 31, 2020Updated 5 years ago
- Synthesis from Inductive specification eMpowered by Bidirectional Abstract Interpretation☆22Dec 3, 2023Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆22Mar 23, 2016Updated 9 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- SUPA☆28Jan 15, 2026Updated last month
- A Free World Class High Performance SAT Solver☆21Jul 12, 2021Updated 4 years ago