tum-i4 / dta-vs-oscLinks
Dynamic Taint Analysis versus Obfuscated Self-Checking
☆16Updated 4 years ago
Alternatives and similar repositories for dta-vs-osc
Users that are interested in dta-vs-osc are comparing it to the libraries listed below
Sorting:
- LLVM based devirtualization PoC’s.☆22Updated 4 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 5 years ago
- ☆25Updated 6 months ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Updated last year
- ☆13Updated 2 years ago
- ☆45Updated 4 years ago
- Ghidra plugin that adds a window showing the high P-code for the current function.☆17Updated 2 years ago
- LLVM Without The ROP Gadgets!☆26Updated last year
- Binary Ninja plugin for automating VMProtect analysis☆63Updated 3 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated 2 years ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆49Updated 4 years ago
- ☆31Updated 5 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆22Updated 4 years ago
- AMD SVM hypervisor rootkit proof of concept☆48Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆75Updated 6 years ago
- Triton based symbolic emulator☆16Updated 3 years ago
- An obfuscator bases on llvm for multiple language and platform☆19Updated 8 years ago
- ☆76Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated 2 years ago
- Python bindings for BochsCPU☆37Updated 4 months ago
- VTIL command line utility☆27Updated 3 years ago
- Playing with LLVM passes☆38Updated 2 years ago
- ☆13Updated 3 years ago
- ☆13Updated 5 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Updated 3 years ago
- ☆30Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17Updated 7 years ago