mishegos
bddisasm
Our great sponsors
mishegos | bddisasm | |
---|---|---|
6 | 3 | |
219 | 838 | |
0.9% | 0.6% | |
8.2 | 7.4 | |
8 days ago | 27 days ago | |
C++ | C | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mishegos
-
Differ: Tool for testing and validating transformed programs
Differential fuzzing is woefully underutilized -- our experience is that it consistently[1] finds[2] bugs that "traditional" fuzzing techniques struggle to discover, and that the primary obstacles to its adoption are harness and orchestration complexity. DIFFER goes a long way towards overcoming those obstacles!
(FD: My company.)
[1]: https://github.com/trailofbits/mishegos
[2]: https://x509-limbo.com/
- Zydis v4 is out now, now featuring code generation and rewriting
-
Just released v0.2.0 of bddisasm - a no_std x86/x86_64 instruction decoder which aims to provide as much information as possible about an instruction
You may also want to check mishegos for another way of comparing different decoders.
-
Is Ghirda's Disassembly ASM output accurate enough?
Take a look at something like mishegos to see how sometimes the same instruction will be decoded differently by different disassemblers: https://github.com/trailofbits/mishegos
- Destroying x86_64 instruction decoders with differential fuzzing
-
Capstone Disassembler Framework
It sounds like what you want is Mishegos [1], described here [2].
[1] https://github.com/trailofbits/mishegos
bddisasm
-
Just released v0.2.0 of bddisasm - a no_std x86/x86_64 instruction decoder which aims to provide as much information as possible about an instruction
You're probably right. The library was first developed for our in-house hypervisor and memory introspection engine, which needed a way to analyze and emulate instructions, so one of the main goals is to make this as easy as possible. There's a really really small [emulator](https://github.com/bitdefender/bddisasm/blob/master/bindings/rsbddisasm/bddisasm/examples/emulator.rs) example in the repo that showcases this.
-
bddisasm - Rust bindings for the Bitdefender x86/x86_64 instruction decoder
The code is available on GitHub (bddisasm-sys contains the FFI bindings, generated with bindgen, while bddisasm holds the higher-level API bindings).
What are some alternatives?
disas-bench - X86 disassembler benchmark
iced - Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua
sandsifter - The x86 processor fuzzer
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
capstone - Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings. [Moved to: https://github.com/capstone-engine/capstone]
gifdec - small C GIF decoder
fadec - A fast and lightweight decoder for x86 and x86-64 and encoder for x86-64.
bufferoverflow - This repo educates developers about BOF vulnerabilities and provides practical solutions to prevent these risks. It equips developers with knowledge and tools to counter one of the most common security vulnerabilities.
xng-rs - A Rust wrapper for the Xtratum Next Generation API