Comsecuris / luaqemu
QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows fast prototyping of target systems without any native code and minimal effort in Lua.
☆149Updated 6 years ago
Alternatives and similar repositories for luaqemu:
Users that are interested in luaqemu are comparing it to the libraries listed below
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆106Updated 6 years ago
- Automated Return-Oriented Programming Chaining☆84Updated 8 years ago
- ELF Unstrip Tool☆106Updated 9 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 2 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 3 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆207Updated 3 years ago
- ☆63Updated 6 years ago
- A linux system call fuzzer using TriforceAFL☆175Updated last year
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- Rewriting functions in compiled binaries using McSema☆88Updated 5 years ago
- ☆162Updated 8 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 3 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆258Updated last year
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 6 years ago
- add symbols back into a stripped ELF binary (~strip)☆170Updated 7 years ago
- ☆65Updated 4 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆116Updated 5 years ago
- A patched version of VEX to work with PyVEX.