tum-i4 / dta-vs-osc
Dynamic Taint Analysis versus Obfuscated Self-Checking
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for dta-vs-osc
- ☆24Updated 3 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 3 years ago
- ☆19Updated 4 months ago
- An obfuscator bases on llvm for multiple language and platform☆19Updated 7 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆22Updated last year
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆21Updated 2 years ago
- LLVM based devirtualization PoC’s.☆20Updated 2 years ago
- ☆13Updated 4 years ago
- obfuscation that aims to not stand out☆20Updated 2 years ago
- Triton based symbolic emulator☆16Updated 2 years ago
- LLVM Without The ROP Gadgets!☆24Updated 10 months ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Ghidra plugin that adds a window showing the high P-code for the current function.☆14Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 5 years ago
- Personal curation of Clang/LLVM patches.☆13Updated 3 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆32Updated 6 months ago
- ☆15Updated last year
- Binary Ninja plugin for automating VMProtect analysis☆56Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 3 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆15Updated last year
- ☆24Updated 8 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆12Updated last year
- Experiment building lifting-bits dependencies with pure CMake. Migrated to:☆19Updated last month
- Symbolic executor for Binary Ninja's MLIL☆22Updated last month
- ☆29Updated 3 years ago
- ☆39Updated 3 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆25Updated 5 years ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆16Updated 6 years ago