chosen-instruction-attack / CIA-toolchainLinks
The toolchain of Chosen-instruction attack
☆21Updated 3 years ago
Alternatives and similar repositories for CIA-toolchain
Users that are interested in CIA-toolchain are comparing it to the libraries listed below
Sorting:
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- This repo contains the tests and results that were done during the research of SATURN☆43Updated 5 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Updated 4 years ago
- ☆45Updated 4 years ago
- ☆62Updated last year
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 7 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆38Updated 5 years ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 9 years ago
- Ghidra plugin that adds a window showing the high P-code for the current function.☆18Updated 2 years ago
- Alternative API for IDA / Hex-Rays☆75Updated 2 years ago
- Toy LLVM obfuscator pass☆76Updated 4 years ago
- Emulation Wrapper Solution is a IDA Pro plugin that brings emulator capacities to provide features such as debugging an mocking.☆23Updated 2 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- ☆25Updated 8 months ago
- nanoMIPS IDA plugin☆69Updated 4 years ago
- Library for Capstone instruction to LLVM IR translation☆47Updated 8 years ago
- obfuscation that aims to not stand out☆23Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆22Updated 4 years ago
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆42Updated 2 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆73Updated 6 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Updated last year
- PoC for a taint based attack on VMProtect☆123Updated 6 years ago
- ☆76Updated 4 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Updated 6 years ago
- Triton based symbolic emulator☆16Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago