trailofbits / biscLinks
Borrowed Instructions Synthetic Computation
☆70Updated 10 years ago
Alternatives and similar repositories for bisc
Users that are interested in bisc are comparing it to the libraries listed below
Sorting:
- Binary Analysis Platform☆74Updated 12 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- Memory awesomeness.☆29Updated 10 years ago
- ☆45Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆131Updated 3 years ago
- ☆26Updated last month
- Fuzzer☆43Updated 11 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- ☆38Updated 10 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 7 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38Updated 7 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Updated 9 years ago
- ☆25Updated 10 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- A Python tool to generate ROP chains☆65Updated 11 months ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆119Updated 10 years ago
- ☆27Updated 10 years ago