Build your emulation environment as needed
☆66Apr 14, 2021Updated 4 years ago
Alternatives and similar repositories for dobby2
Users that are interested in dobby2 are comparing it to the libraries listed below
Sorting:
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆39Apr 3, 2020Updated 5 years ago
- VMProtect analysis script☆56Mar 31, 2020Updated 5 years ago
- ☆22Mar 23, 2016Updated 9 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 2 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Jul 30, 2022Updated 3 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆166Dec 5, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- IDA plugins and scripts for analyzing register usage frame☆181Jun 8, 2023Updated 2 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆23Dec 3, 2021Updated 4 years ago
- ☆12May 6, 2020Updated 5 years ago
- PoC for a taint based attack on VMProtect☆123Jul 3, 2019Updated 6 years ago
- This is an instruction to run your own SMM code.☆108Mar 8, 2021Updated 4 years ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- Virtual Machine Introspection, Tracing & Debugging☆596Feb 22, 2022Updated 4 years ago
- ☆41Jun 6, 2021Updated 4 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- Some writeups in ctf.☆11Mar 31, 2022Updated 3 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- ☆189Mar 21, 2025Updated 11 months ago
- A LLVM Sanitizer for Symbolic Tracing☆234Feb 7, 2026Updated 3 weeks ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Apr 10, 2021Updated 4 years ago
- LLVM meets Code Property Graphs☆96Feb 27, 2021Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- ☆16Feb 11, 2022Updated 4 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Aug 11, 2021Updated 4 years ago
- Instrument code to trace memory☆19Feb 15, 2019Updated 7 years ago
- Scalable Validator for Binary Lifters☆62Jun 28, 2020Updated 5 years ago
- Tool for viewing and analyzing execution traces☆319Mar 18, 2021Updated 4 years ago
- Toy LLVM obfuscator pass☆76Sep 11, 2021Updated 4 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- ☆20Nov 5, 2018Updated 7 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- This is a place to share my miscellaneous projects.☆116May 2, 2020Updated 5 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆108Jul 8, 2018Updated 7 years ago
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆345Feb 2, 2026Updated 3 weeks ago
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆167Feb 16, 2025Updated last year