pfalcon / ScratchABlockLinks
Yet another crippled decompiler project
☆108Updated 3 years ago
Alternatives and similar repositories for ScratchABlock
Users that are interested in ScratchABlock are comparing it to the libraries listed below
Sorting:
- Rewriting functions in compiled binaries using McSema☆90Updated 6 years ago
- Generic Decoder Specification Language Toolkit☆32Updated 6 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆109Updated 7 years ago
- TRiad Is A Decompiler. Triad is a tiny, free and open source, Capstone based x86 decompiler for ELF binaries.☆103Updated 9 years ago
- Decompiler for x86 and x86-64 ELF binaries☆221Updated 6 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 3 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 3 years ago
- Adds symbols to a ELF file.☆63Updated 10 years ago
- Library to read and edit files in the following formats: Executable and Linking Format (ELF), Portable Executable (PE), MachO and OAT (An…☆132Updated last year
- An amd64 symbolic emulator☆312Updated 4 years ago
- ☆70Updated 3 years ago
- radare2 + miasm2 = ♥☆102Updated 5 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- ELF Unstrip Tool☆107Updated 10 years ago
- rune - radare2 based symbolic emulator☆27Updated 8 years ago
- Snowman decompiler☆108Updated 8 years ago
- ☆74Updated 5 years ago
- Implementations of program analysis tools with a focus on machine code☆208Updated 11 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Classes with architecture-specific information useful to other projects.☆95Updated this week
- Binary Ninja plugin to decompile binaries using RetDec API☆164Updated 7 years ago
- Run basic functions from stripped binaries cross platform☆111Updated 8 years ago
- add symbols back into a stripped ELF binary (~strip)☆175Updated 8 years ago
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- The Jakstab static analysis platform for binaries☆160Updated 5 years ago
- Safely execute an arbitrary x86 instruction☆184Updated last year
- Program synthesis based deobfuscation framework for the USENIX 2017 paper "Syntia: Synthesizing the Semantics of Obfuscated Code"☆311Updated 5 years ago
- realtime cross-tool collaborative reverse engineering☆101Updated 2 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Updated 3 years ago
- Minemu is a minimal emulator for dynamic taint analysis ( this is a mirror of https://minemu.org/code/minemu.git )☆41Updated 5 years ago