xoreaxeaxeax / reductio
An exploration of code homeomorphism
☆376Updated 7 years ago
Alternatives and similar repositories for reductio:
Users that are interested in reductio are comparing it to the libraries listed below
- Computing with traps☆1,290Updated 12 years ago
- Architectural privilege escalation on x86☆854Updated 7 years ago
- Instructions database and utilities for X86/X64 and ARM (THUMB/A32/A64) architectures.☆331Updated last year
- A work-in-progress deobfuscator for movfuscated binaries☆725Updated last year
- The vim execution engine☆113Updated 7 years ago
- Visual reverse engineering tool.☆275Updated 8 years ago
- Brainfuck interpreter inside printf☆665Updated 4 years ago
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆158Updated 3 years ago
- An optimizing decompiler☆723Updated 4 years ago
- The x86 processor fuzzer☆505Updated 6 years ago
- Survey of program analysis research with a focus on machine code☆563Updated 4 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆404Updated 2 years ago
- A differential fuzzer for x86 decoders☆250Updated 6 months ago
- Visual reverse engineering tool. Veles is better, use it. Don't use this.☆587Updated 4 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆320Updated 5 years ago
- Implementations of program analysis tools with a focus on machine code☆209Updated 10 years ago
- Interactive Disassembler GUI - This Repository is NOT a supported MongoDB product☆248Updated 8 years ago
- Psychological warfare in reverse engineering☆999Updated 5 years ago
- A Turing complete ROP compiler☆319Updated 11 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆252Updated 6 years ago
- An instruction trace visualisation tool for dynamic program analysis☆371Updated 2 years ago
- A static binary rewriter that does not use heuristics☆303Updated 6 years ago
- Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode☆341Updated 6 years ago
- Exploration of x86-64 ISA using speculative execution.☆310Updated 4 years ago
- An amd64 symbolic emulator☆312Updated 3 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆282Updated 3 years ago
- The DrK Attack - Proof of concept☆343Updated 3 years ago
- Minimal RarVM Toolchain☆233Updated 9 years ago
- 🔍 Colourful visualization tool for binary files☆539Updated last year
- Interactive Redundant Assembler (shell)☆97Updated 5 years ago