2xic-archive / Reverse-engineering-toolLinks
Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis
☆12Updated 6 years ago
Alternatives and similar repositories for Reverse-engineering-tool
Users that are interested in Reverse-engineering-tool are comparing it to the libraries listed below
Sorting:
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 5 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆51Updated 3 years ago
- ☆14Updated 7 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- Some writeups in ctf.☆11Updated 3 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Updated 2 weeks ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 6 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Updated 4 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Updated 8 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆10Updated 7 years ago
- A simple tool for parsing elf binaries☆10Updated 6 years ago
- ARMv7 architecture plugin☆40Updated last year
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆33Updated 7 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago
- Valgrind tool for tracing memory accesses☆13Updated 10 months ago
- ☆16Updated 6 years ago
- (ARM Thumb) Re-Assembler utility for reverse engineering☆17Updated 7 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38Updated 5 years ago
- ☆12Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago