s3team / loopLinks
Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
☆51Updated 9 years ago
Alternatives and similar repositories for loop
Users that are interested in loop are comparing it to the libraries listed below
Sorting:
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Updated 3 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 7 years ago
- Futile attempt to solve the Tigress challenges using angr☆22Updated 6 years ago
- Symbolic Simplification with PAttern Matching☆106Updated 8 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 2 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- Some low-level stuff☆107Updated last year
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- Utilities for generating dynamic traces☆93Updated 5 months ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A patched version of VEX to work with PyVEX.☆112Updated this week
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- suite of binaries used to test function identification☆29Updated 7 years ago
- ☆124Updated 4 years ago
- CRETE under development☆59Updated 5 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- Flex 'em lexers☆40Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- The Jakstab static analysis platform for binaries☆160Updated 5 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆126Updated last year
- A set of programs used for benchmarking the strength of obfuscation☆91Updated 7 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆88Updated 10 years ago
- Nampa - FLIRT for (binary) ninjas☆95Updated 8 months ago