evm-sec / high-pcodeLinks
Output high level Pcode (PcodeAST) in Ghidra
☆16Updated 2 years ago
Alternatives and similar repositories for high-pcode
Users that are interested in high-pcode are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Python bindings for BochsCPU☆37Updated last month
- binary ninja related code☆36Updated 6 months ago
- Ghidra plugin that adds a window showing the high P-code for the current function.☆17Updated 2 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆53Updated 4 months ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Updated 2 years ago
- ☆44Updated 4 years ago
- breaking decompilers☆52Updated 4 months ago
- LLVM Without The ROP Gadgets!☆26Updated last year
- transpile llil to c++ for execution and testing☆43Updated last year
- ☆25Updated 4 months ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 7 months ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- Alternative API for IDA / Hex-Rays☆75Updated 2 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Updated 8 months ago
- An extremely experimental Binary Ninja importer for the type layout information emitted by the -Zprint-type-sizes flag of the Rust compil…☆36Updated 2 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- ☆13Updated 3 years ago
- Mixed Boolean Arithmetic Simplification using E-Graphs☆22Updated 5 months ago
- MBA deobfuscator via Program Synthesis and Term Rewriting☆53Updated last month
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 4 years ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆26Updated 2 years ago
- LLVM based devirtualization PoC’s.☆21Updated 3 years ago
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆55Updated last year
- Reverse engineered API for Microsoft's Time Travel Debugger☆35Updated last year