static-analysis-engineering / CodeHawk-BinaryLinks
CodeHawk Binary Analyzer for malware analysis and general reverse engineering
☆38Updated last week
Alternatives and similar repositories for CodeHawk-Binary
Users that are interested in CodeHawk-Binary are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 8 months ago
- ☆74Updated 2 years ago
- ☆31Updated 5 years ago
- A Low Level IL emulator for Binary Ninja☆41Updated 6 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 4 years ago
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆61Updated 4 years ago
- ☆59Updated 3 years ago
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- Scalable Validator for Binary Lifters☆62Updated 5 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- AIL: The angr Intermediate Language.☆33Updated 8 months ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆69Updated 4 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated last year
- Ghidra P-Code emulation and static LLVM lifting in Python☆38Updated 3 years ago
- SMT Modeling and Configurable Program Analysis for Ghidra's PCODE☆32Updated this week
- StdFuzzer is the reference implementation of a generic bit-level fuzzer with LibAFL☆48Updated last year
- transpile llil to c++ for execution and testing☆48Updated 2 years ago
- A Ghidra plugin for locating object file boundaries.☆127Updated 2 weeks ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Updated 2 years ago
- The CRISPR static binary patcher☆37Updated 5 years ago
- Tantō slices functions into more consumable chunks☆78Updated last month
- ☆17Updated 2 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆64Updated 4 years ago
- ☆21Updated last year
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Updated 2 years ago
- ☆45Updated 4 years ago
- tool for multi-execution jump coverage introspection☆68Updated last year