omerktz / TraFix
Implementation of TraFix (automatic trainable decompiler based on NMT) as published in ArXiv
☆39Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for TraFix
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- KLEE Symbolic Execution Engine☆61Updated 5 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆91Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆58Updated 4 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆22Updated 5 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆47Updated 8 years ago
- ☆32Updated last year
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 5 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆74Updated 2 years ago
- Signedness-Agnostic Strided-Interval☆35Updated 5 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆57Updated 3 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Updated 5 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Updated 9 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- ☆50Updated 5 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Updated 8 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆17Updated 8 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Triton based R2 plugin for concolic execution and total control☆30Updated 5 years ago
- Concolic Execution Fuzzer☆24Updated 3 years ago
- CRETE under development☆58Updated 4 years ago
- Use Intel Pin tools to analysis binary.☆36Updated 9 years ago
- ☆30Updated 4 years ago