Comsecuris / luaqemu
QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows fast prototyping of target systems without any native code and minimal effort in Lua.
☆149Updated 6 years ago
Alternatives and similar repositories for luaqemu
Users that are interested in luaqemu are comparing it to the libraries listed below
Sorting:
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆107Updated 6 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 3 years ago
- ELF Unstrip Tool☆105Updated 9 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Export dwarf debug information from IDA Pro☆208Updated 2 years ago
- radare2 + miasm2 = ♥☆103Updated 5 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆207Updated 3 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 2 years ago
- ☆63Updated 6 years ago
- A patched version of VEX to work with PyVEX.☆107Updated 2 months ago
- Rewriting functions in compiled binaries using McSema☆89Updated 5 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆79Updated 6 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 6 years ago
- Fast static binary instrumentation for linux/x86☆82Updated 8 years ago
- A linux system call fuzzer using TriforceAFL☆176Updated last year
- KLEE Symbolic Execution Engine☆60Updated 5 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- add symbols back into a stripped ELF binary (~strip)☆171Updated 7 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆208Updated 2 years ago
- Some low-level stuff☆105Updated 11 months ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆170Updated 10 years ago
- A PCode Emulator for Ghidra.☆108Updated 4 years ago
- A taint-tracking plugin for the Valgrind memory checking tool☆259Updated last year
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- Adds symbols to a ELF file.☆61Updated 9 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆163Updated 3 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆105Updated 6 years ago
- Classes with architecture-specific information useful to other projects.☆91Updated last week