csl-ugent / diabloLinks
Diablo is a retargetable link-time binary rewriting framework
☆79Updated 4 years ago
Alternatives and similar repositories for diablo
Users that are interested in diablo are comparing it to the libraries listed below
Sorting:
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆84Updated 4 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 3 years ago
- Safely execute an arbitrary x86 instruction☆186Updated last year
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- ☆74Updated 5 years ago
- Kernel-based debugger for Linux applications☆75Updated 3 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆70Updated last year
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆107Updated 7 years ago
- Symbolic Simplification with PAttern Matching☆108Updated 8 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆79Updated 6 years ago
- A branch-monitor-based solution for process monitoring.☆135Updated 5 years ago
- ☆50Updated 4 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆48Updated 5 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38Updated 5 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- A library for dynamic binary rewriting☆58Updated 4 years ago
- Hypervisor-based debugger☆190Updated 5 years ago
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Updated 7 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆139Updated 7 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated 2 years ago
- ☆69Updated last year
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- Extracting high level semantic information from binary code☆65Updated 6 years ago
- idamagnum is a plugin for integrating MagnumDB requests within IDA☆133Updated 5 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- ☆182Updated 7 years ago