shuakabane / stelftools
cross-architecture static library detector for IoT malware
☆36Updated last year
Alternatives and similar repositories for stelftools
Users that are interested in stelftools are comparing it to the libraries listed below
Sorting:
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆193Updated last week
- Triton-based DSE library with loading and exploration capabilities (and more!)☆118Updated last week
- This repository contains the currently implemented angr concrete targets.☆33Updated last year
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆112Updated 5 months ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆176Updated 2 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆152Updated 3 months ago
- Control-flow-flattening and string deobfuscator☆150Updated 3 years ago
- Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.☆207Updated 6 months ago
- Make the Windows API in Ghidra easy to read and informative.☆27Updated 3 years ago
- angr's exploration technique to perform taint analysis☆61Updated 5 years ago
- Flex 'em lexers☆39Updated 4 years ago
- Run IDA scripts headlessly.☆160Updated 3 weeks ago
- Binja (sort of) headless☆47Updated 3 months ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆217Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 4 months ago
- Practical P-Code examples☆56Updated 4 years ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆104Updated 3 weeks ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Unofficial CMake build for Ghidra's C++ SLEIGH code☆151Updated last week
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆76Updated 2 years ago
- Automatically identify and extract potential anti-debugging techniques used by malware.☆20Updated 5 months ago
- AFL bindings for Unicorn-Engine☆77Updated last week
- ☆48Updated 3 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆22Updated 5 years ago
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆154Updated 3 months ago
- ☆23Updated 2 years ago
- A faster firmware base address scanner.☆53Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆80Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago