Processes and metrics for assessing obfuscation effectiveness
☆55Jan 26, 2017Updated 9 years ago
Alternatives and similar repositories for obfuscation-metrics
Users that are interested in obfuscation-metrics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An obfuscator bases on llvm for multiple language and platform☆19Jun 28, 2017Updated 8 years ago
- An Obfuscation Approach using Probabilistic Control Flows☆32Jan 18, 2017Updated 9 years ago
- The central ASPIRE framework repository, start here if you want to use our tools (this contains all tools and documentation)☆14Apr 17, 2021Updated 5 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- LLVM Abstraction & Refinement Tool. The goal of this tool is to provide LLVM-to-LLVM transformations that implement various program abstr…☆19Mar 17, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Non-linear Mixed Boolean-Arithmetic Expressions☆73Apr 18, 2024Updated 2 years ago
- A demontration of disassemblers generated by sleigh2rust☆13Nov 25, 2024Updated last year
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- ☆21Oct 2, 2018Updated 7 years ago
- Obfuscator based on logic-bombs☆68May 9, 2020Updated 6 years ago
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆319Jun 11, 2020Updated 5 years ago
- Mixed Boolean-Arithmetic☆107Aug 24, 2025Updated 8 months ago
- A set of programs used for benchmarking the strength of obfuscation☆97Feb 25, 2018Updated 8 years ago
- Triton based R2 plugin for concolic execution and total control☆35Nov 26, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A way to detect DBI frameworks, Debuggers and VMs.☆24Nov 17, 2020Updated 5 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- My research WIP bluepill hypervisor☆40Mar 15, 2023Updated 3 years ago
- Analyzing the driver and internal module of EasyAntiCheat.☆40May 1, 2023Updated 3 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Apply ROP protection to a binary using binary rewriting with GTIRB☆34Jul 1, 2025Updated 10 months ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆895Nov 21, 2023Updated 2 years ago
- ☆25Mar 22, 2023Updated 3 years ago
- Test case minimizer for afl-fuzz☆28Jul 19, 2017Updated 8 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Symbolic Simplification with PAttern Matching☆109Feb 22, 2017Updated 9 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆72Oct 7, 2022Updated 3 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆87Mar 17, 2026Updated last month
- Find RSA primes in files☆20May 14, 2022Updated 3 years ago
- LLVM JIT: An Example☆17Jul 7, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Nov 17, 2017Updated 8 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Feb 12, 2026Updated 2 months ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆52Jan 19, 2016Updated 10 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- LLVM Metadata Visualizer☆21Nov 30, 2017Updated 8 years ago
- A binary to LLVM translator☆151Jun 5, 2018Updated 7 years ago
- String formatting in Rust without memory allocator☆17Dec 2, 2024Updated last year