nneonneo / sstic-2021
Files for my solution to the SSTIC 2021 challenge
☆15Updated 3 years ago
Alternatives and similar repositories for sstic-2021:
Users that are interested in sstic-2021 are comparing it to the libraries listed below
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- ☆47Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- ☆72Updated 3 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- ☆76Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- ☆28Updated 4 years ago
- binary ninja related code☆35Updated last month
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 6 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆83Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- VMX intrinsics plugin for Hex-Rays decompiler☆70Updated 5 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Updated 4 years ago
- ☆45Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 10 months ago
- ☆34Updated 3 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆30Updated 4 years ago
- ☆64Updated 5 months ago