tum-i4 / obfuscation-benchmarksLinks
A set of programs used for benchmarking the strength of obfuscation
☆91Updated 7 years ago
Alternatives and similar repositories for obfuscation-benchmarks
Users that are interested in obfuscation-benchmarks are comparing it to the libraries listed below
Sorting:
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆51Updated 9 years ago
- ☆144Updated 9 months ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆177Updated 3 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆62Updated 2 years ago
- Symbolic Execution Over Processor Traces☆122Updated 11 months ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 3 years ago
- Utilities for generating dynamic traces☆93Updated 4 months ago
- Your S2E project management tools. Visit https://s2e.systems/docs to get started.☆96Updated last month
- A LLVM Pass with runtime dataflow sanitization☆33Updated 6 years ago
- LLVM-based compiler to create artificial software diversity to protect software from code-reuse attacks.☆136Updated 6 years ago
- InsTrim: Lightweight Instrumentation for Coverage-guided Fuzzing☆82Updated 5 years ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆260Updated 5 months ago
- Binary Code Similarity Analysis (BCSA) Tool☆123Updated 2 months ago
- The Jakstab static analysis platform for binaries☆160Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆80Updated 6 years ago
- ☆44Updated 5 years ago
- ☆181Updated 6 years ago
- Usenix Security 2021 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation☆155Updated 2 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90Updated last year
- ☆10Updated 5 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- A repository with binaries for angr tests and examples.☆63Updated last week
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- ☆42Updated 8 years ago
- ☆86Updated 9 months ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆103Updated 4 years ago