Compiled CGC binaries for experimentation porpoises.
☆22Jul 6, 2017Updated 8 years ago
Alternatives and similar repositories for cgc-bins
Users that are interested in cgc-bins are comparing it to the libraries listed below
Sorting:
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- A module that multiplexes interactions with lists of python objects.☆14Aug 24, 2022Updated 3 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Neil (Not Exactly an Intermediate Language), using MPC with LLVM☆11Oct 16, 2016Updated 9 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆331Jun 6, 2018Updated 7 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- The radare2 + frida book for Mobile Application assessment☆40Jan 11, 2019Updated 7 years ago
- A library of assemblers and disassemblers derived from LLVM TableGen data☆26Aug 12, 2025Updated 7 months ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 9 months ago
- ☆16Aug 26, 2023Updated 2 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Full implementaion of Genius☆33May 15, 2023Updated 2 years ago
- Data-Driven Software Vulnerability Discovery (SVD)☆13May 27, 2020Updated 5 years ago
- ☆11Sep 28, 2022Updated 3 years ago
- ☆16Aug 16, 2023Updated 2 years ago
- ☆22Dec 6, 2023Updated 2 years ago
- ☆15Mar 13, 2021Updated 5 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 6 months ago
- VUDDY & hmark for IoTcube☆22Apr 28, 2023Updated 2 years ago
- Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing☆14Aug 21, 2023Updated 2 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- A transformer-based VS Code extension that enables one to discover vulnerabilities in Java files.☆12Dec 1, 2022Updated 3 years ago
- seed files used in UNIFUZZ experiments☆14Mar 17, 2021Updated 5 years ago
- ☆17Feb 10, 2026Updated last month
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- An Automated Vulnerability Detection System☆59Aug 22, 2016Updated 9 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- ☆13Oct 31, 2022Updated 3 years ago
- DARPA Challenges Sets for Linux, Windows, and macOS☆536Jun 29, 2023Updated 2 years ago
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- ☆13Jan 12, 2018Updated 8 years ago
- Example of a Python-C++ interface using gRPC☆11Jun 23, 2023Updated 2 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- A JavaScript wrapper for Z3 containing support for regular expressions & capture groups☆23Jul 3, 2024Updated last year
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago