intel / vmtaint
Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.
☆39Updated last year
Alternatives and similar repositories for vmtaint:
Users that are interested in vmtaint are comparing it to the libraries listed below
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆70Updated last year
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 5 years ago
- Python bindings for BochsCPU☆35Updated 3 weeks ago
- ☆47Updated 2 years ago
- ☆40Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- LLVM Without The ROP Gadgets!☆26Updated last year
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- transpile llil to c++ for execution and testing☆42Updated last year
- AMD SVM hypervisor rootkit proof of concept☆45Updated last year
- VMX intrinsics plugin for Hex-Rays decompiler☆70Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- kAFL Fuzzer☆33Updated last week
- ☆23Updated last month
- ☆76Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆26Updated 5 years ago
- A fast execution trace symbolizer for Windows.☆130Updated 10 months ago
- ☆40Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated last year
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- Build your emulation environment as needed☆65Updated 3 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆35Updated 4 years ago
- Slightly better IDA code folding☆14Updated 4 years ago
- binary ninja related code☆25Updated 2 years ago
- A dynamically loadable virtual-machine based rootkit designed for Linux Kernel v5.13.0 using AMD-V (SVM).☆29Updated 2 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- ☆29Updated 4 years ago