gamozolabs / rv32i_jitLinks
A super simple RV32i JIT, designed for ease of understanding and modification
☆85Updated 2 years ago
Alternatives and similar repositories for rv32i_jit
Users that are interested in rv32i_jit are comparing it to the libraries listed below
Sorting:
- Why fuzzing with emulators is amazing☆138Updated 4 years ago
- A debugger for Linux in Rust☆76Updated 2 years ago
- x86 decoders for the yaxpeax project☆137Updated 2 weeks ago
- A (SLEIGH) disassembler that supports multiple architectures☆84Updated 3 years ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated 5 months ago
- Snapshot of the vectorized MMU that lines up with the vectorized MMU blog☆22Updated 5 years ago
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆41Updated 2 years ago
- A binary analysis framework written in Rust.☆170Updated last month
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆110Updated last year
- Reverse engineering project on stream☆13Updated 4 years ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆36Updated 3 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆152Updated last year
- A div-less, mul-less, atomic-less `rv64i` compiler toolchain using purely clang, musl, and compiler-rt☆30Updated 5 years ago
- An architecture-agnostic ELF file flattener for shellcode☆218Updated 3 years ago
- A simple Aarch64 hypervisor for Raspberry Pi☆35Updated 4 years ago
- A differential fuzzer for x86 decoders☆251Updated 8 months ago
- Safely execute an arbitrary x86 instruction☆180Updated last year
- Generate Rust Emulators and Disassemblers from Ghidra Sleigh.☆17Updated last year
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 4 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆84Updated 2 months ago
- ☆133Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- Binja Arm64 Disassembler☆94Updated last month
- Unofficial CMake build for Ghidra's C++ SLEIGH code☆155Updated this week
- yaxdis, a small and naive disassembler using yaxpeax decoders☆33Updated 2 months ago
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated 6 months ago
- simple type recognition in decompiled executables☆111Updated 11 months ago