trailofbits / magnifierLinks
☆59Updated 2 years ago
Alternatives and similar repositories for magnifier
Users that are interested in magnifier are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆36Updated 3 weeks ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- The CRISPR static binary patcher☆37Updated 4 years ago
- Dr. Disassembler☆36Updated 3 years ago
- ☆45Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆38Updated last week
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Xyntia, the black-box deobfuscator☆77Updated 3 months ago
- VSCode extension for the LLVM IR language☆61Updated last year
- QuarkslaB Dynamic Linker library☆89Updated 9 months ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated 9 months ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- Python bindings for BochsCPU☆37Updated 2 months ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 4 years ago
- Function signature matching and signature generation plugin for Binary Ninja☆75Updated last year
- ☆31Updated 5 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆53Updated 4 months ago
- ☆72Updated last year
- Tantō slices functions into more consumable chunks☆71Updated 5 months ago
- transpile llil to c++ for execution and testing☆43Updated last year
- The next generation reverse engineering IDE (work-in-progress).☆97Updated last year
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆51Updated 4 months ago
- ☆76Updated 4 years ago
- x86/x64 architecture plugin☆40Updated last year
- The DREAM decompiler☆44Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago