farosato / angr-antievasionView external linksLinks
Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).
☆35Oct 23, 2017Updated 8 years ago
Alternatives and similar repositories for angr-antievasion
Users that are interested in angr-antievasion are comparing it to the libraries listed below
Sorting:
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆61Jan 22, 2021Updated 5 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- ☆90Jul 5, 2016Updated 9 years ago
- ☆33Oct 15, 2018Updated 7 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 10 months ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv☆40Nov 23, 2019Updated 6 years ago
- ☆67May 5, 2021Updated 4 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Jan 15, 2019Updated 7 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Dynamic function binding in C !!!☆27Sep 15, 2020Updated 5 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- BAP python bindings☆22Dec 1, 2023Updated 2 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 6 years ago
- Binary Ninja Plugin for devi - see https://github.com/murx-/devi/ for devi details☆20Jan 17, 2024Updated 2 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- ☆18Feb 26, 2018Updated 7 years ago
- A VIM plugin to make life feasible in the presence of space-hippies.☆20Jul 31, 2019Updated 6 years ago
- CRETE under development☆60Jun 30, 2020Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- A study on the automation of unpacking API wrapping in Themida☆12May 3, 2018Updated 7 years ago
- Generic server for collaborative code analysis☆13Dec 19, 2016Updated 9 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago