0xSh4dy / learning_llvm
☆27Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for learning_llvm
- Kernel Read Write Execute☆37Updated 2 months ago
- ☆13Updated 2 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆42Updated 4 months ago
- ☆16Updated last month
- gradient-based symbolic execution engine implemented from scratch☆35Updated 11 months ago
- Open Source eBPF Malware Analysis Framework☆43Updated last month
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆111Updated 2 weeks ago
- iTLB multihit PoC☆40Updated last year
- Python bindings for BochsCPU☆34Updated last month
- Identify and extract files from container formats using unblob.☆17Updated this week
- A Rust crate for parsing Windows user minidumps.☆40Updated 6 months ago
- ☆18Updated last year
- ☆64Updated 4 months ago
- A parser for Microsoft PDB (Program Database) debugging information☆24Updated 2 weeks ago
- Frida plugin for Binary Ninja☆16Updated 7 months ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- Web based binary analysis☆81Updated this week
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆27Updated 3 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated 8 months ago
- ☆23Updated last year
- ☆31Updated 5 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 6 months ago
- ☆40Updated 4 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆58Updated 3 weeks ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆80Updated 2 years ago
- Example of an ELF parser to learn about the ELF format☆10Updated last month
- BINARLY Research Tools and PoCs☆34Updated last month
- ☆30Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year