mahaloz / sailr-evalLinks
The SAILR paper's evaluation pipline for measuring the quality of decompilation
☆113Updated 9 months ago
Alternatives and similar repositories for sailr-eval
Users that are interested in sailr-eval are comparing it to the libraries listed below
Sorting:
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆114Updated this week
- ☆60Updated last month
- Triton-based DSE library with loading and exploration capabilities (and more!)☆127Updated last week
- ☆72Updated last year
- Unofficial CMake build for Ghidra's C++ SLEIGH code☆159Updated last week
- The Decompilation Wiki: info on all things decompilation☆214Updated last month
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- BinRec: Dynamic Binary Lifting and Recompilation☆143Updated last year
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆200Updated last week
- An awesome & curated list of binary rewriting papers☆250Updated 3 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆226Updated 5 years ago
- A versatile and easy-to-use static binary patching tool.☆39Updated last month
- Run IDA scripts headlessly.☆190Updated last week
- ☆144Updated 10 months ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆107Updated 4 months ago
- ☆182Updated last year
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆50Updated 11 months ago
- LibAFL-based snapshot fuzzer to fuzz TMNF's RPC interface. Includes a free RCE exploit!☆42Updated 2 years ago
- Binary Type Inference Ghidra Plugin☆165Updated last year
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- An IntelliJ IDEA plugin for working on Ghidra Extensions.☆98Updated last year
- Practical P-Code examples☆61Updated 4 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆177Updated 3 years ago
- Core emulator components for Icicle☆235Updated last month
- Symbolic Execution Over Processor Traces☆122Updated last year
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆82Updated last week
- Visualise the Data Flow Graph of the PCODE at all stages in the decompilation process☆51Updated 4 months ago
- A /proc/mem IDA loader to snapshot a running process☆164Updated last month
- PoC of fuzzing closed-source userspace binaries with KVM☆166Updated last year
- Xyntia, the black-box deobfuscator☆74Updated 2 months ago