mahaloz / sailr-evalLinks
The SAILR paper's evaluation pipline for measuring the quality of decompilation
☆115Updated 11 months ago
Alternatives and similar repositories for sailr-eval
Users that are interested in sailr-eval are comparing it to the libraries listed below
Sorting:
- Triton-based DSE library with loading and exploration capabilities (and more!)☆132Updated 2 months ago
- ☆62Updated 2 months ago
- ☆73Updated last year
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆119Updated this week
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆204Updated last week
- Unofficial CMake build for Ghidra's C++ SLEIGH code☆160Updated this week
- BinRec: Dynamic Binary Lifting and Recompilation☆143Updated 2 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆226Updated 5 years ago
- The Decompilation Wiki: info on all things decompilation☆224Updated last week
- Core emulator components for Icicle☆254Updated 3 weeks ago
- Run IDA scripts headlessly.☆213Updated 2 months ago
- ☆147Updated last year
- An awesome & curated list of binary rewriting papers☆253Updated 3 years ago
- A versatile and easy-to-use static binary patching tool.☆45Updated last month
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆43Updated 2 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 3 years ago
- An IntelliJ IDEA plugin for working on Ghidra Extensions.☆104Updated last year
- Binary Type Inference Ghidra Plugin☆166Updated last year
- Practical P-Code examples☆64Updated 4 years ago
- Visualise the Data Flow Graph of the PCODE at all stages in the decompilation process☆53Updated 7 months ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated 9 months ago
- A /proc/mem IDA loader to snapshot a running process☆165Updated 4 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆116Updated 7 months ago
- Symbolic Execution Over Processor Traces☆124Updated last year
- Xyntia, the black-box deobfuscator☆83Updated 2 weeks ago
- ☆185Updated last year
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆153Updated last year
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆119Updated last month