heyitsanthony / vexllvmLinks
Decode machine code into VEX IR and translate into LLVM IR
☆28Updated 6 years ago
Alternatives and similar repositories for vexllvm
Users that are interested in vexllvm are comparing it to the libraries listed below
Sorting:
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- IDA SDK tech demo☆39Updated 5 years ago
- Build your emulation environment as needed☆65Updated 4 years ago
- Library for Capstone instruction to LLVM IR translation☆47Updated 7 years ago
- Alternative API for IDA / Hex-Rays☆75Updated last year
- VMX intrinsics plugin for Hex-Rays decompiler☆71Updated 5 years ago
- ☆43Updated 4 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Updated 6 years ago
- nanoMIPS IDA plugin☆67Updated 3 years ago
- ☆31Updated 5 years ago
- IDA plugin displaying the P-Code for the current function☆67Updated last year
- This repo contains the tests and results that were done during the research of SATURN☆41Updated 4 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆64Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- ☆76Updated 3 years ago
- Humane API for storing and accessing persistent data in IDA Pro databases☆82Updated 5 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 7 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- Obfuscator based on logic-bombs☆67Updated 5 years ago
- Toy LLVM obfuscator pass☆75Updated 3 years ago
- x86/x64 architecture plugin☆40Updated last year
- PoC for a taint based attack on VMProtect☆110Updated 6 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Updated 2 years ago
- Binary Deobfuscation Series☆21Updated 5 years ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Create and use macros in IDA's CLIs☆65Updated 2 years ago