xorpse / parascopeLinks
weggli ruleset scanner for source code and binaries
☆35Updated 2 months ago
Alternatives and similar repositories for parascope
Users that are interested in parascope are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 11 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆98Updated this week
- ☆21Updated 2 years ago
- ☆70Updated 10 months ago
- ☆67Updated 5 months ago
- ☆83Updated last year
- A tool to perform so called BGE attack☆26Updated 7 months ago
- Python bindings for BochsCPU☆37Updated 5 months ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 8 months ago
- Xyntia, the black-box deobfuscator☆84Updated last month
- ☆52Updated last year
- A tool for firmware cartography☆162Updated last month
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- ☆80Updated 3 years ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Updated this week
- Diaphora Machine Learning tools and datasets☆23Updated last year
- ☆26Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆66Updated last year
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆128Updated last year
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆124Updated this week
- ☆32Updated 2 years ago
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆73Updated 7 months ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆104Updated this week
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago