2xic-archive / Reverse-engineering-toolLinks
Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis
☆12Updated 6 years ago
Alternatives and similar repositories for Reverse-engineering-tool
Users that are interested in Reverse-engineering-tool are comparing it to the libraries listed below
Sorting:
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 5 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Updated 6 years ago
- ☆14Updated 7 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 9 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- ☆31Updated 5 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago
- Some writeups in ctf.☆11Updated 3 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 5 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- This is the source of our Return Oriented Programming tool.☆14Updated 5 years ago
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- Fetch and set configuration values from IDAPython scripts☆24Updated last week
- ☆16Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 7 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- ☆12Updated 7 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆50Updated 3 years ago
- ARMv7 architecture plugin☆40Updated last year
- Valgrind tool for tracing memory accesses☆13Updated 8 months ago
- Dalvik Header Plugin for IDA Pro☆23Updated 12 years ago
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago