trailofbits / magnifierLinks
☆58Updated 2 years ago
Alternatives and similar repositories for magnifier
Users that are interested in magnifier are comparing it to the libraries listed below
Sorting:
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆43Updated 4 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆36Updated this week
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Xyntia, the black-box deobfuscator☆74Updated 2 months ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Updated 11 years ago
- A symbolic execution engine for LLVM IR☆51Updated 3 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆33Updated 3 years ago
- Dr. Disassembler☆36Updated 3 years ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆33Updated this week
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆52Updated 3 months ago
- Python bindings for BochsCPU☆37Updated 3 weeks ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Tantō slices functions into more consumable chunks☆70Updated 4 months ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Updated 8 months ago
- QuarkslaB Dynamic Linker library☆86Updated 8 months ago
- VSCode extension for the LLVM IR language☆61Updated last year
- ☆31Updated 5 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- The next generation reverse engineering IDE (work-in-progress).☆97Updated last year
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆35Updated 3 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆62Updated 4 years ago
- Apply ROP protection to a binary using binary rewriting with GTIRB☆33Updated 2 months ago
- The DREAM decompiler☆43Updated 3 years ago
- simple type recognition in decompiled executables☆113Updated last year
- LLVM Without The ROP Gadgets!☆26Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago