Code and artifacts related to the Asia CCS 2022 paper
☆38Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for SAST_on_Decompilers
Users that are interested in SAST_on_Decompilers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ☆239Jan 14, 2024Updated 2 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- VulSeeker: A Semantic Learning Based Vulnerability Seeker For Cross-Platform Binary☆106Dec 25, 2018Updated 7 years ago
- ☆14Dec 10, 2021Updated 4 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- ☆39Jun 6, 2024Updated last year
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆39Nov 27, 2024Updated last year
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Jan 27, 2025Updated last year
- ☆11Mar 5, 2026Updated 2 weeks ago
- ☆72Oct 25, 2024Updated last year
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- An awesome & curated list of binary code similarity papers☆600Jan 5, 2026Updated 2 months ago
- ☆42Oct 26, 2022Updated 3 years ago
- ☆56Oct 22, 2020Updated 5 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Woodpecker: Verifying systems rules using rule-directed symbolic execution☆12Jul 5, 2016Updated 9 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- ☆20Aug 30, 2024Updated last year
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆232Jun 9, 2020Updated 5 years ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆34Apr 7, 2022Updated 3 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Fuzzing Parsers with Tokens☆33Jan 14, 2021Updated 5 years ago
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- IDA (sort of) headless☆28Feb 17, 2024Updated 2 years ago
- ☆63Oct 17, 2023Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Slides of mine.☆12Apr 19, 2024Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year