muellerberndt / obfuscation-metrics
Processes and metrics for assessing obfuscation effectiveness
☆55Updated 8 years ago
Alternatives and similar repositories for obfuscation-metrics:
Users that are interested in obfuscation-metrics are comparing it to the libraries listed below
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆29Updated 9 years ago
- Futile attempt to solve the Tigress challenges using angr☆26Updated 5 years ago
- Plugins for IDA Pro and Hex-Rays☆41Updated 6 years ago
- Automatically exported from code.google.com/p/mynav☆29Updated 10 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- Enable Virtualenv or Conda in IDAPython☆42Updated 4 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Updated 8 years ago
- ☆26Updated 6 years ago
- ☆25Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- just an experiment☆21Updated 6 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- REIL translation library☆36Updated 8 years ago
- Recover control flow graph from obfuscated codes☆38Updated 9 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆132Updated 10 years ago
- IDA Pro Scripts☆34Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 8 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 9 years ago
- ☆87Updated 9 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- This IDAPython script tags subroutines according to their use of imported functions☆73Updated 3 years ago
- Create and use macros in IDA's CLIs☆64Updated last year
- A Low Level IL emulator for Binary Ninja☆37Updated 6 years ago