purseclab / D-helixLinks
a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.
☆16Updated 9 months ago
Alternatives and similar repositories for D-helix
Users that are interested in D-helix are comparing it to the libraries listed below
Sorting:
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆17Updated last month
- SyzScope is a research project that aims to reveal high-risk security bug from Syzbot. Learn more details in our paper.☆24Updated 3 years ago
- For our CCS24 paper 🏆 "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhu…☆99Updated 2 months ago
- BENZENE: A Practical Root Cause Analysis System with an Under-Constrained State Mutation☆24Updated last year
- Symbolic Execution Over Processor Traces☆121Updated 10 months ago
- ☆144Updated 8 months ago
- A framework to test the correctness of the Linux kernel patch.☆22Updated last year
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆58Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆29Updated 3 weeks ago
- ☆34Updated 2 years ago
- ☆46Updated last month
- ☆24Updated 9 months ago
- A data-flow-guided fuzzer☆122Updated last year
- ☆40Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated last year
- Full implementaion of Genius☆31Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 5 months ago
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution☆19Updated 2 years ago
- Repository for monolithic firmware blobs☆79Updated 3 years ago
- ☆65Updated last year
- ☆63Updated this week
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆60Updated 6 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆82Updated 3 years ago
- ☆57Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.☆101Updated last month
- angr's exploration technique to perform taint analysis☆63Updated 5 years ago
- ☆88Updated 2 months ago
- ☆27Updated 2 years ago
- GitHub Cloner & Compiler☆72Updated 3 years ago