degrigis / symbion-use-casesView external linksLinks
Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution
☆15Dec 30, 2021Updated 4 years ago
Alternatives and similar repositories for symbion-use-cases
Users that are interested in symbion-use-cases are comparing it to the libraries listed below
Sorting:
- ☆17Sep 23, 2024Updated last year
- Official implementation for UniASM: Binary Code Similarity Detection without Fine-tuning.☆20Apr 6, 2023Updated 2 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- This repository contains the currently implemented angr concrete targets.☆34Sep 1, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- Cryfind is a tool to help you find crypto signatures in binary.☆36Oct 19, 2021Updated 4 years ago
- Python bindings for Shimple/Jimple IR from Soot.☆42Feb 5, 2026Updated last week
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 9 months ago
- ☆82Sep 3, 2021Updated 4 years ago
- ☆18Sep 4, 2023Updated 2 years ago
- The slides from my Saintcon 2019 talk.☆48Feb 9, 2020Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆22May 31, 2023Updated 2 years ago
- ☆47May 18, 2020Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Mar 30, 2019Updated 6 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆28Dec 28, 2021Updated 4 years ago
- ☆238Jan 14, 2024Updated 2 years ago
- AIL: The angr Intermediate Language.☆33May 28, 2025Updated 8 months ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- angr's exploration technique to perform taint analysis☆65Mar 26, 2020Updated 5 years ago
- ☆11May 17, 2024Updated last year
- ☆31Feb 20, 2022Updated 3 years ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆23Nov 20, 2019Updated 6 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- oo7, a binary analysis tool to defend against Spectre vulnerabilities☆34Oct 16, 2020Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124May 18, 2025Updated 8 months ago
- ☆130May 15, 2025Updated 9 months ago
- ☆134May 6, 2024Updated last year
- ☆35Jan 27, 2025Updated last year
- ☆73Jun 26, 2024Updated last year
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆81Jan 26, 2026Updated 3 weeks ago
- ☆81Aug 30, 2024Updated last year