sefcom / VarBERTLinks
β61Updated 2 weeks ago
Alternatives and similar repositories for VarBERT
Users that are interested in VarBERT are comparing it to the libraries listed below
Sorting:
- The SAILR paper's evaluation pipline for measuring the quality of decompilationβ113Updated 9 months ago
- For our CCS24 paper π "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhuβ¦β108Updated 5 months ago
- An IntelliJ IDEA plugin for working on Ghidra Extensions.β99Updated last year
- A collection of papers, tools about type inferring, variable renaming, function name inferring on stripped binary executables.β111Updated last month
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!β115Updated 2 weeks ago
- Symbolic Execution Over Processor Tracesβ122Updated last year
- Triton-based DSE library with loading and exploration capabilities (and more!)β127Updated last week
- Run IDA scripts headlessly.β199Updated last week
- Symbolic Execution Engine based on Ghidra's PCodeβ84Updated 2 years ago
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.β50Updated last year
- β72Updated last year
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysisβ226Updated 5 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddβ¦β59Updated 2 months ago
- AFL bindings for Unicorn-Engineβ83Updated last month
- Official implementation of AsmDepictor, "A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reβ¦β29Updated last year
- β43Updated 3 months ago
- Unofficial CMake build for Ghidra's C++ SLEIGH codeβ159Updated last week
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IRβ200Updated last week
- a generic decompiler testing framework that can automatically vet the decompilation correctness on the function level.β17Updated last year
- A data-flow-guided fuzzerβ123Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.β179Updated 3 years ago
- Binary Code Similarity Analysis (BCSA) Toolβ123Updated 3 months ago
- β145Updated 10 months ago
- A versatile and easy-to-use static binary patching tool.β39Updated 2 months ago
- Generates `.pyi` type stubs for the entire Ghidra APIβ151Updated 7 months ago
- Binary Ninja plugin for forward/backward slicingβ18Updated 4 years ago
- β25Updated last year
- A faster firmware base address scanner.β52Updated 3 years ago
- angr's exploration technique to perform taint analysisβ65Updated 5 years ago
- Ghidra Emulates Functionsβ55Updated 4 years ago