chosen-instruction-attack / CIA-toolchain
The toolchain of Chosen-instruction attack
☆17Updated 2 years ago
Related projects: ⓘ
- A suite of experiments for evaluating open-source binary taint trackers.☆30Updated 2 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆57Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated last year
- This repo contains the tests and results that were done during the research of SATURN☆36Updated 3 years ago
- ☆43Updated 7 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆27Updated 6 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆25Updated 5 years ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- ☆10Updated 4 years ago
- Library for Capstone instruction to LLVM IR translation☆41Updated 6 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆68Updated 10 months ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆21Updated 4 years ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆94Updated 2 years ago
- ☆37Updated 3 years ago
- Toy LLVM obfuscator pass☆69Updated 3 years ago
- ROP Benchmark is a tool to compare ROP compilers☆38Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- ☆18Updated 2 months ago
- ☆20Updated 5 months ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆34Updated 4 years ago
- Binary Ninja plugin for forward/backward slicing☆15Updated 3 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆33Updated 8 months ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆12Updated 2 years ago
- ☆19Updated 2 years ago
- Symbolic Execution Over Processor Traces☆116Updated last month
- ☆9Updated 5 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 5 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago