IDA Hexrays To Joern
☆46Nov 7, 2024Updated last year
Alternatives and similar repositories for joern-ida
Users that are interested in joern-ida are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA Hexrays To CodeQL☆54Nov 7, 2024Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆15Jul 24, 2025Updated 8 months ago
- ☆23Jul 3, 2022Updated 3 years ago
- convert luac to lua source☆11Dec 20, 2024Updated last year
- ☆14Feb 4, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Arlo file format helper☆16Mar 7, 2024Updated 2 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Feb 1, 2021Updated 5 years ago
- The source code of project "LLift" (Enhancing static analysis with LLM)☆85Mar 5, 2024Updated 2 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- How to Patch / Detour / Hook .NET managed code using DLL injection . TYPE 2 : Target method defined in external DLL☆15Sep 23, 2023Updated 2 years ago
- BigMap integration on AFL++☆15Apr 5, 2021Updated 4 years ago
- datacon比赛2024年漏洞分析赛道解题框架与运行镜像压缩包☆182Jun 10, 2025Updated 9 months ago
- CVE-2023-21707 EXP☆28Jul 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆36Oct 27, 2025Updated 5 months ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 10 months ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆16Jun 5, 2024Updated last year
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 6 months ago
- ☆19Dec 28, 2021Updated 4 years ago
- A containerized Model Context Protocol (MCP) server providing static code analysis using Joern's Code Property Graph (CPG) with support f…☆54Mar 23, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A benchmark to evaluate taint analysis☆29Jun 20, 2022Updated 3 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- ☆66Dec 7, 2024Updated last year
- ☆47May 27, 2023Updated 2 years ago
- Parsing-based Analyzer☆75Jun 8, 2025Updated 9 months ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆15Nov 11, 2022Updated 3 years ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆58Mar 18, 2026Updated last week
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Mar 18, 2024Updated 2 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 用来将Tai-e改造为开箱即用的静态代码安全分析框架的一些demo☆37Apr 17, 2024Updated last year
- awd attack framework,Django + Mysql☆16Feb 8, 2025Updated last year
- seprmvr64, downgrade&jailbreak utility☆28Jun 7, 2024Updated last year
- The Z3-Noodler String Solver☆25Updated this week
- Automatically identify and extract potential anti-debugging techniques used by malware.☆172Nov 22, 2024Updated last year
- Cisco ASA Software and ASDM Security Research☆87Sep 6, 2022Updated 3 years ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago