tum-i4 / dta-vs-osc
Dynamic Taint Analysis versus Obfuscated Self-Checking
☆16Updated 3 years ago
Alternatives and similar repositories for dta-vs-osc:
Users that are interested in dta-vs-osc are comparing it to the libraries listed below
- ☆22Updated 2 weeks ago
- ☆24Updated 3 years ago
- LLVM based devirtualization PoC’s.☆20Updated 3 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 4 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆21Updated 3 years ago
- Triton based symbolic emulator☆16Updated 2 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Updated last year
- Ghidra plugin that adds a window showing the high P-code for the current function.☆15Updated last year
- ☆30Updated 4 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- An obfuscator bases on llvm for multiple language and platform☆19Updated 7 years ago
- ☆15Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- ☆13Updated 5 years ago
- Symbolic executor for Binary Ninja's MLIL☆22Updated 4 months ago
- Personal curation of Clang/LLVM patches.☆13Updated 3 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆34Updated 3 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆32Updated 9 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Binary Ninja plugin for automating VMProtect analysis☆58Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆24Updated 8 years ago
- VTIL command line utility☆27Updated 3 years ago
- AMD SVM hypervisor rootkit proof of concept☆44Updated last year
- White-box analytic framework based on LLVM☆39Updated 5 years ago
- LLVM Without The ROP Gadgets!☆26Updated last year
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- IDA (sort of) headless☆22Updated 11 months ago
- Decode machine code into VEX IR and translate into LLVM IR☆25Updated 5 years ago