nneonneo / sstic-2021View external linksLinks
Files for my solution to the SSTIC 2021 challenge
☆15Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for sstic-2021
Users that are interested in sstic-2021 are comparing it to the libraries listed below
Sorting:
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- ☆72Jul 8, 2021Updated 4 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- ☆49Feb 23, 2022Updated 3 years ago
- ☆13Dec 27, 2019Updated 6 years ago
- Program synthesis tools and utilities for LLVM.☆20Jul 6, 2023Updated 2 years ago
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- Virtual machine with a custom instruction set in C☆16Jul 17, 2018Updated 7 years ago
- extracts shellcode from a nasm compile macho binary☆16Jan 28, 2021Updated 5 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- This repo contains the tests and results that were done during the research of SATURN☆44Dec 10, 2020Updated 5 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Sep 20, 2024Updated last year
- writeups for CTFs and other stuff☆23Dec 29, 2020Updated 5 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- ☆64Feb 23, 2025Updated 11 months ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 11, 2026Updated last week
- A firmware base address search tool.☆48Jan 31, 2026Updated 2 weeks ago
- Frida example to trace VBA CreateObject calls and some string deobfuscations calls. You need latest Frida 12.9.8 for improved symbol look…☆25Sep 3, 2020Updated 5 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆60Jul 3, 2025Updated 7 months ago
- Analysis of VBS exploit CVE-2018-8174☆31Jul 12, 2018Updated 7 years ago
- TInA is an automated, generic, verification-friendly and trustworthy lifting technique turning GNU-style inline assembly into semanticall…☆29Jul 7, 2021Updated 4 years ago
- VTIL command line utility☆27Feb 1, 2022Updated 4 years ago
- ☆28May 9, 2022Updated 3 years ago
- Toy LLVM obfuscator pass☆76Sep 11, 2021Updated 4 years ago
- Xyntia, the black-box deobfuscator☆87Dec 11, 2025Updated 2 months ago
- ☆32Jun 19, 2024Updated last year
- Write your own exploit for $CASH☆26Jun 16, 2022Updated 3 years ago
- PageBuster - dump all executable pages of packed processes.☆204Mar 31, 2021Updated 4 years ago
- Pandemic binary program analysis framework in OCaml (abandoned)☆71May 28, 2019Updated 6 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- ☆31Oct 13, 2025Updated 4 months ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- Payload Obfuscation for Red Teams workshop materials☆78Nov 25, 2025Updated 2 months ago
- Pomodoro timer using React Native☆10Jun 3, 2020Updated 5 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago