Ayrx / reutils
A collection of scripts to aid in reverse engineering and exploit development.
☆23Updated 3 years ago
Alternatives and similar repositories for reutils:
Users that are interested in reutils are comparing it to the libraries listed below
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- ☆72Updated 3 years ago
- ☆12Updated 3 years ago
- ☆76Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆32Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Updated 5 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆15Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆28Updated last year
- A library for patching ELFs☆55Updated 4 years ago
- ☆80Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- ☆31Updated 2 weeks ago
- ☆76Updated 2 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 3 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- ☆18Updated 3 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 2 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆31Updated 2 months ago
- Raw IDA Kernel API for IDAPython☆33Updated 3 years ago
- ☆47Updated 2 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- ☆34Updated 3 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago