chosen-instruction-attack / CIA-toolchain
The toolchain of Chosen-instruction attack
☆18Updated 2 years ago
Alternatives and similar repositories for CIA-toolchain:
Users that are interested in CIA-toolchain are comparing it to the libraries listed below
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆19Updated 6 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- ☆40Updated 3 years ago
- ☆44Updated 7 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 6 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- ☆24Updated 11 months ago
- This repo contains the tests and results that were done during the research of SATURN☆38Updated 4 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆26Updated 5 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated last year
- MBA-Blast is a tool for simplification of MBA expressions.☆61Updated 3 years ago
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- ☆11Updated 5 years ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- Library for Capstone instruction to LLVM IR translation☆45Updated 7 years ago
- ROP Benchmark is a tool to compare ROP compilers☆41Updated 2 years ago
- ☆20Updated 3 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆18Updated 4 years ago
- ☆42Updated 2 years ago
- experiments for IJON☆12Updated 5 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆16Updated 3 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆70Updated last year
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- WinAFL modified for RDP client fuzzing☆19Updated 2 years ago
- ☆44Updated 4 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆28Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Updated 2 years ago
- A list of data-only attacks☆19Updated 7 months ago