trailofbits / mishegos
A differential fuzzer for x86 decoders
☆244Updated 5 months ago
Alternatives and similar repositories for mishegos:
Users that are interested in mishegos are comparing it to the libraries listed below
- ☆173Updated 2 years ago
- Safely execute an arbitrary x86 instruction☆180Updated last year
- ☆74Updated 4 years ago
- Why fuzzing with emulators is amazing☆135Updated 4 years ago
- Exploration of x86-64 ISA using speculative execution.☆308Updated 3 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆372Updated 6 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- A super simple RV32i JIT, designed for ease of understanding and modification☆84Updated 2 years ago
- An event driven multi-core process debugging, tracing, and manipulation framework.☆172Updated 5 years ago
- anvill forges beautiful LLVM bitcode out of raw machine code☆349Updated 6 months ago
- Rellic produces goto-free C output from LLVM bitcode☆554Updated 6 months ago
- Snapshot-based coverage-guided windows kernel fuzzer☆317Updated 3 years ago
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆158Updated 3 years ago
- ☆113Updated last year
- The fastest Intel-PT decoder for fuzzing☆368Updated last year
- IPC scripts for access to Intel CRBUS☆118Updated 3 years ago
- Self-hosting binary instrumentation framework for security research☆212Updated last year
- Binary coverage tool without binary modification for Windows☆435Updated 4 years ago
- x86 decoders for the yaxpeax project☆135Updated 9 months ago
- The first analysis framework for CPU microcode☆390Updated 2 years ago
- The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by W…☆377Updated last year
- ☆357Updated last year
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆361Updated 6 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆337Updated 6 years ago
- X86 disassembler benchmark☆60Updated 8 months ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 7 months ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆246Updated 7 years ago
- Hypervisor-based debugger☆187Updated 4 years ago
- Minimal RarVM Toolchain☆232Updated 9 years ago