BassamGraini / CVE-2022-2588Links
☆12Updated 2 years ago
Alternatives and similar repositories for CVE-2022-2588
Users that are interested in CVE-2022-2588 are comparing it to the libraries listed below
Sorting:
- In-memory ELF shared library loading☆44Updated 2 years ago
- ☆18Updated 3 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Updated 2 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated last year
- Legacy IDAPython project for Hex-Ray's IDA Pro, now maintained as part of the IDA SDK.☆28Updated last week
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Updated 2 years ago
- Android Security Bug Queries for CheckMarx☆20Updated 3 years ago
- This is an IDA plugin to recover class information from C++ binary.☆18Updated 5 years ago
- Toy LLVM obfuscator pass☆75Updated 4 years ago
- 关于intel和amd指令行为不一样这件事☆61Updated 3 years ago
- Export IDA microcode to BinExport format so that you can use BinDiff to diff microcodes☆11Updated 11 months ago
- Unicorn CPU emulator framework tutorial☆20Updated 4 years ago
- IDA (sort of) headless☆26Updated last year
- Deobfuscate OLLVM Bogus Control Flow via angr☆64Updated 3 years ago
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆30Updated last week
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Updated 4 years ago
- a code virtualizer based on angr☆30Updated 2 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆70Updated 5 years ago
- A solution for llvmvm in MRCTF2022☆11Updated 3 years ago
- Format the tcg log for qemu and present it in a more intuitive form☆14Updated 2 years ago
- 详细说明及演示MMU相关原理及过程(用于理解Linux内核Root Kernelpatch)☆23Updated last year
- ☆41Updated 3 years ago
- ☆39Updated last month
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Updated last year
- 利用angr去除ollvm的虚假控制流☆14Updated 4 years ago
- exploit for dirtycow☆14Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- 用于存放IDA的研究资料和文档☆94Updated 4 years ago
- ☆33Updated 4 years ago