softsec-unh / MBA-Solver
☆40Updated 3 years ago
Alternatives and similar repositories for MBA-Solver:
Users that are interested in MBA-Solver are comparing it to the libraries listed below
- MBA-Blast is a tool for simplification of MBA expressions.☆61Updated 3 years ago
- MBA deobfuscator via Program Synthesis and Term Rewriting☆48Updated last year
- ☆30Updated 4 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated last year
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆39Updated last year
- LLVM Without The ROP Gadgets!☆26Updated last year
- Mixed Boolean Arithmetic Simplification using E-Graphs☆20Updated 3 weeks ago
- ☆23Updated 3 weeks ago
- Decode machine code into VEX IR and translate into LLVM IR☆26Updated 5 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A suite of experiments for evaluating open-source binary taint trackers.☆32Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated 2 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆70Updated last year
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆22Updated last year
- ☆13Updated last month
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- Symbolic executor for Binary Ninja's MLIL☆22Updated 5 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A symbolic execution engine for LLVM IR☆51Updated 2 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆31Updated 2 years ago
- The toolchain of Chosen-instruction attack☆18Updated 2 years ago
- transpile llil to c++ for execution and testing☆42Updated last year
- ☆69Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- Raw IDA Kernel API for IDAPython☆33Updated 2 years ago
- obfuscation that aims to not stand out☆23Updated 2 years ago
- Python bindings for BochsCPU☆35Updated 3 weeks ago