The toolchain of Chosen-instruction attack
☆21May 3, 2022Updated 3 years ago
Alternatives and similar repositories for CIA-toolchain
Users that are interested in CIA-toolchain are comparing it to the libraries listed below
Sorting:
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆23Dec 3, 2021Updated 4 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆39Apr 3, 2020Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Aug 6, 2021Updated 4 years ago
- Program synthesis tools and utilities for LLVM.☆20Jul 6, 2023Updated 2 years ago
- VMLifter 是一个基于指令执行轨迹的语义提升工具,专注于值依赖驱动的程序语义重建 。☆40Mar 1, 2026Updated last week
- A version of Griffin used to provide program traces☆15Sep 2, 2020Updated 5 years ago
- APK For Dumping Memory libil2cpp.so / libUE4.so from memory☆16Sep 3, 2021Updated 4 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- Zyrox: LLVM based, compile-time obfuscator plugin.☆90Feb 21, 2026Updated 2 weeks ago
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆167Feb 16, 2025Updated last year
- obfuscation that aims to not stand out☆24Mar 27, 2022Updated 3 years ago
- HElib is an open-source software library that implements homomorphic encryption. It supports the BGV scheme with bootstrapping and the Ap…☆22Jul 6, 2021Updated 4 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated last month
- sample bypass anti-anti-debug tool by race condition☆27Aug 2, 2022Updated 3 years ago
- ☆23Mar 13, 2023Updated 2 years ago
- Synthesis of loop-free programs☆24Updated this week
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆45Jan 22, 2026Updated last month
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- PoC code for IsValidImageCRC()☆22May 3, 2023Updated 2 years ago
- Commodity Obfuscation Engine for Intel SGX☆20Jul 21, 2019Updated 6 years ago
- ☆59Jan 27, 2023Updated 3 years ago
- All materials related https://resources.infosecinstitute.com/tutorial-building-reverse-engineering-simple-virtual-machine-protection/☆55May 4, 2017Updated 8 years ago
- Port of MBA Solver SiMBA to C/C++ (MBA deobfuscation in real world applications)☆107Nov 5, 2025Updated 4 months ago
- VMProtect analysis script☆56Mar 31, 2020Updated 5 years ago
- ☆145Oct 26, 2024Updated last year
- Python library that provides methods for Boolean circuit manipulation, analysis, and synthesis☆32Feb 8, 2026Updated last month
- Synthesis from Inductive specification eMpowered by Bidirectional Abstract Interpretation☆22Dec 3, 2023Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- SUPA☆28Jan 15, 2026Updated last month