tum-i4 / obfuscation-benchmarksLinks
A set of programs used for benchmarking the strength of obfuscation
☆91Updated 7 years ago
Alternatives and similar repositories for obfuscation-benchmarks
Users that are interested in obfuscation-benchmarks are comparing it to the libraries listed below
Sorting:
- ☆147Updated last year
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Symbolic Execution Over Processor Traces☆125Updated last year
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆64Updated 3 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆263Updated 9 months ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆178Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Utilities for generating dynamic traces☆93Updated 8 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆81Updated 6 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- ☆42Updated 8 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆126Updated 5 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124Updated 6 months ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆43Updated 2 years ago
- Block Oriented Programming -- Compiler☆186Updated 5 years ago
- ☆182Updated 7 years ago
- An unofficial implementation of asm2vec as a standalone python package☆172Updated 4 years ago
- ☆58Updated 5 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91Updated last year
- Collection of various llvm passes☆128Updated 10 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆140Updated 7 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆227Updated 5 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆127Updated last year
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago