trailofbits / magnifierLinks
☆59Updated 2 years ago
Alternatives and similar repositories for magnifier
Users that are interested in magnifier are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated 2 months ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆38Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- Dr. Disassembler☆37Updated 4 years ago
- Python bindings for BochsCPU☆37Updated 4 months ago
- ☆45Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- VSCode extension for the LLVM IR language☆60Updated last year
- The CRISPR static binary patcher☆37Updated 5 years ago
- Xyntia, the black-box deobfuscator☆84Updated 3 weeks ago
- ☆31Updated 5 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 7 months ago
- Tantō slices functions into more consumable chunks☆76Updated 3 weeks ago
- ☆81Updated 7 months ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated last year
- simple type recognition in decompiled executables☆117Updated last year
- ☆74Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- Function signature matching and signature generation plugin for Binary Ninja☆77Updated last month
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 7 months ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆68Updated last week
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- transpile llil to c++ for execution and testing☆46Updated last year
- QuarkslaB Dynamic Linker library☆89Updated last year
- x86/x64 architecture plugin☆40Updated last year
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆62Updated 4 years ago