mechanicalnull / phantasmLinks
Binary Ninja plugin for visualizing coverage over time
☆25Updated 3 years ago
Alternatives and similar repositories for phantasm
Users that are interested in phantasm are comparing it to the libraries listed below
Sorting:
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆47Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Python bindings for BochsCPU☆37Updated 2 months ago
- ☆42Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- ☆18Updated 3 years ago
- binary ninja related code☆35Updated 4 months ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated last year
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 5 months ago
- ☆76Updated 3 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- transpile llil to c++ for execution and testing☆43Updated last year
- Load function names from an IDA Pro database inside GDB☆21Updated 6 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Build your emulation environment as needed☆67Updated 4 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆29Updated 2 years ago