chosen-instruction-attack / CIA-toolchainLinks
The toolchain of Chosen-instruction attack
☆18Updated 3 years ago
Alternatives and similar repositories for CIA-toolchain
Users that are interested in CIA-toolchain are comparing it to the libraries listed below
Sorting:
- MBA-Blast is a tool for simplification of MBA expressions.☆66Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆46Updated 9 years ago
- This repo contains the tests and results that were done during the research of SATURN☆41Updated 4 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- ☆44Updated 4 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Build your emulation environment as needed☆65Updated 4 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆36Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆18Updated 4 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- Library for Capstone instruction to LLVM IR translation☆47Updated 7 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Alternative API for IDA / Hex-Rays☆75Updated last year
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆158Updated 6 months ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- An IDA processor for eBPF bytecode☆48Updated 3 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Updated 7 months ago
- 动态二进制插桩框架DynamoRIO通过将程序代码进行反复插桩(Instrumentation)执行构建了源程序代码与操纵代码之间的桥梁,使DynamoRIO的客户端编写者能够在更高的层面上驾驭原有的程序代码.虽然程序的载体还是被编译成原生的汇编指令集执行,但是不管是原生代…☆34Updated 3 years ago
- ☆50Updated last year
- Toy LLVM obfuscator pass☆75Updated 4 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆71Updated 5 years ago
- PoC for a taint based attack on VMProtect☆121Updated 6 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 2 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 4 years ago
- A list of data-only attacks☆19Updated 3 weeks ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆108Updated 3 years ago