A blanket execution/min hash semantic hash tool for binary function identification
☆18Apr 22, 2016Updated 9 years ago
Alternatives and similar repositories for indika
Users that are interested in indika are comparing it to the libraries listed below
Sorting:
- Unofficial mirror of☆11Feb 2, 2018Updated 8 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Dynamic tracing in Linux using fast tracepoints☆11Aug 30, 2018Updated 7 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated 11 months ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- A study on the automation of unpacking API wrapping in Themida☆12May 3, 2018Updated 7 years ago
- Dispar - Cross-platform Disassemling binary Parser☆20Nov 21, 2021Updated 4 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- 32-bit x86 emulator using ncurses and capstone/keystone/unicorn☆31Dec 6, 2018Updated 7 years ago
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- Window Executable file Function tracer using Debugging API☆44Sep 26, 2019Updated 6 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Modular binary injection framework☆18Jan 6, 2020Updated 6 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- Lightweight Symbolic Execution Engine☆23Jul 1, 2015Updated 10 years ago
- Basic Block Trace: DynamoRIO client☆29Dec 19, 2021Updated 4 years ago
- Unicorn engine website☆22Apr 10, 2025Updated 10 months ago
- ☆30Jan 6, 2021Updated 5 years ago
- Investigation Planner for fast running analysis with predictable execution time. For example, static analysis.☆27Jun 2, 2019Updated 6 years ago
- A dockerized droidbox instance☆25Apr 7, 2016Updated 9 years ago
- x86 Dynamic Binary Translator Library☆34Dec 19, 2020Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆61Jan 22, 2021Updated 5 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- Fuzzing framework written in OCaml☆33Aug 23, 2016Updated 9 years ago
- KVM-based virtual machine introspection for malware analysis☆29May 11, 2017Updated 8 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Emulator interface for ARM 32-bit☆35Jun 4, 2018Updated 7 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago