revng / demosLinks
The rev.ng demos
☆12Updated 2 months ago
Alternatives and similar repositories for demos
Users that are interested in demos are comparing it to the libraries listed below
Sorting:
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated last week
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆33Updated last month
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- Symbolic executor for Binary Ninja's MLIL☆26Updated last year
- breaking decompilers☆52Updated 5 months ago
- Python interface for Binexport, the Bindiff export format☆17Updated last month
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆116Updated last week
- Code snippets for Binary Ninja's Python API☆30Updated 4 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆53Updated 5 months ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Updated 6 years ago
- A tool to perform so called BGE attack☆25Updated 4 months ago
- Python bindings for BochsCPU☆37Updated 2 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆45Updated 4 years ago
- Xyntia, the black-box deobfuscator☆78Updated last week
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 4 months ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- Bump your ida python script automatically!☆30Updated 6 months ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆52Updated 4 months ago
- ☆76Updated 4 years ago
- ☆59Updated 2 years ago
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆55Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆83Updated 2 years ago
- A Ghidra plugin for locating object file boundaries.☆125Updated last week
- IFL - Interactive Functions List (plugin for Binary Ninja)☆24Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago