Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).
☆31Jan 17, 2022Updated 4 years ago
Alternatives and similar repositories for argXtract
Users that are interested in argXtract are comparing it to the libraries listed below
Sorting:
- Trace function calls using lldb☆13Jul 5, 2021Updated 4 years ago
- This is the repository for paper "An Empirical Study on ARM Disassembly Tools" accepted to ISSTA 2020☆65Aug 22, 2023Updated 2 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- A64: ARM64 Assembler for Erlang☆11Sep 30, 2020Updated 5 years ago
- Recent security papers on firmware analysis☆78Aug 30, 2021Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆30Nov 4, 2023Updated 2 years ago
- ARM disassembler library☆20Aug 11, 2013Updated 12 years ago
- ARM to pseudo code converter that rarely works☆14Dec 21, 2017Updated 8 years ago
- Librarian: An Empirical Study of Security Updates in Android Apps’ Native Code☆22Jan 22, 2021Updated 5 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- ☆15Mar 13, 2021Updated 5 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Sep 4, 2015Updated 10 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Mar 30, 2020Updated 5 years ago
- Debugger and analyzer for ARM ELF executables.☆18Oct 24, 2022Updated 3 years ago
- ☆23Nov 10, 2023Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆39Nov 27, 2024Updated last year
- ☆53Jun 23, 2025Updated 8 months ago
- ☆22Jul 8, 2022Updated 3 years ago
- ☆18Jun 2, 2021Updated 4 years ago
- ☆54Oct 15, 2018Updated 7 years ago
- A Ghidra headless analyzer tailored for Qt binary analysis☆75Oct 7, 2024Updated last year
- ☆84Aug 25, 2021Updated 4 years ago
- A program to read and modify the memory of other processes.☆20May 19, 2023Updated 2 years ago
- ☆37May 19, 2023Updated 2 years ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 3 months ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Jul 19, 2021Updated 4 years ago
- A collection of IDAPython modules made with 💚 by Duo Labs☆295Jan 26, 2022Updated 4 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- A WIP disassember and decompiler written in modern C++ with the goal to do as much work during compile time as possible☆20Mar 1, 2023Updated 3 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆60May 20, 2025Updated 10 months ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- links, information and helper scripts for IDA Pro☆18Jun 21, 2018Updated 7 years ago
- Summary of binary vulnerability mining techniques☆34Jan 6, 2020Updated 6 years ago