h4sh5 / bcddb
cross-architecture binary comparison database
☆8Updated 5 months ago
Alternatives and similar repositories for bcddb:
Users that are interested in bcddb are comparing it to the libraries listed below
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆19Updated 2 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆30Updated 3 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆36Updated 3 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Updated 3 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆64Updated last year
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- ☆24Updated last year
- ☆24Updated 2 years ago
- AFL bindings for Unicorn-Engine☆76Updated last month
- Ghidra Emulates Functions☆54Updated 4 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆18Updated 10 months ago
- ☆9Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆66Updated 3 years ago
- ☆20Updated 3 years ago
- ☆26Updated 2 years ago
- ☆20Updated 3 years ago
- ☆47Updated 3 years ago
- Binary Ninja plugin for forward/backward slicing☆18Updated 4 years ago
- ☆56Updated 4 years ago
- ☆15Updated 2 months ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Symbolic Execution Over Processor Traces☆120Updated 8 months ago
- Pangine disassembly ground truth benchmark☆11Updated 4 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆42Updated last year
- ☆27Updated 3 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- ☆32Updated 4 years ago
- Material and examples for a presentation on static binary analysis.☆42Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 3 years ago