Comsecuris / luaqemuLinks
QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows fast prototyping of target systems without any native code and minimal effort in Lua.
☆153Updated 7 years ago
Alternatives and similar repositories for luaqemu
Users that are interested in luaqemu are comparing it to the libraries listed below
Sorting:
- ELF Unstrip Tool☆107Updated 10 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆108Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆164Updated 4 years ago
- ☆64Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆212Updated 4 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Updated 7 years ago
- ☆167Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆188Updated 4 years ago
- A patched version of VEX to work with PyVEX.☆112Updated 2 months ago
- Classes with architecture-specific information useful to other projects.☆95Updated last week
- Export dwarf debug information from IDA Pro☆214Updated 3 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 3 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Utilities for generating dynamic traces☆93Updated 9 months ago
- Sample programs that illustrate how to use control flow integrity with the clang compiler☆106Updated 6 years ago
- Fast static binary instrumentation for linux/x86☆83Updated 8 years ago
- A linux system call fuzzer using TriforceAFL☆177Updated last year
- Rewriting functions in compiled binaries using McSema☆91Updated 6 years ago
- HexType: Efficient Detection of Type Confusion Errors for C++☆103Updated last year
- add symbols back into a stripped ELF binary (~strip)☆177Updated 8 years ago
- ☆64Updated 4 years ago
- ☆67Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Updated 7 years ago
- SymGDB - symbolic execution plugin for gdb☆218Updated 7 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆213Updated 3 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆304Updated 2 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆120Updated 8 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago