xoreaxeaxeax / reductioLinks
An exploration of code homeomorphism
☆379Updated 7 years ago
Alternatives and similar repositories for reductio
Users that are interested in reductio are comparing it to the libraries listed below
Sorting:
- Architectural privilege escalation on x86☆856Updated 7 years ago
- Computing with traps☆1,309Updated 12 years ago
- An optimizing decompiler☆760Updated 4 years ago
- Visual reverse engineering tool.☆283Updated 8 years ago
- Survey of program analysis research with a focus on machine code☆566Updated 5 years ago
- Psychological warfare in reverse engineering☆1,027Updated 5 years ago
- A work-in-progress deobfuscator for movfuscated binaries☆749Updated 7 months ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆250Updated 9 years ago
- Brainfuck interpreter inside printf☆677Updated 4 years ago
- The x86 processor fuzzer☆519Updated 7 years ago
- Interactive Redundant Assembler (shell)☆96Updated 5 years ago
- The vim execution engine☆116Updated 7 years ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆591Updated 4 years ago
- Implementations of program analysis tools with a focus on machine code☆209Updated 11 years ago
- Simple Driver code for vmlaunch☆160Updated 8 years ago
- We're insanely passionate about command line asm documentation in the cloud, and we're crushing it!☆381Updated 5 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆351Updated 7 years ago
- Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API☆411Updated 5 years ago
- A Turing complete ROP compiler☆325Updated 12 years ago
- An instruction trace visualisation tool for dynamic program analysis☆371Updated 3 years ago
- The "Intel x86 considered harmful" paper☆200Updated 9 years ago
- Run basic functions from stripped binaries cross platform☆113Updated 9 years ago
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆160Updated 3 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆695Updated 3 years ago
- Minimal RarVM Toolchain☆236Updated 10 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- The DrK Attack - Proof of concept☆347Updated 3 years ago
- A differential fuzzer for x86 decoders☆252Updated last year
- ☆141Updated 7 years ago
- Dynamic binary visualization☆43Updated 10 years ago