Fare9 / elfparser_e
Example of an ELF parser to learn about the ELF format
☆10Updated 7 months ago
Alternatives and similar repositories for elfparser_e
Users that are interested in elfparser_e are comparing it to the libraries listed below
Sorting:
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Custom instruction length for hex-rays☆18Updated 4 months ago
- LLDB based debugger for Linux Kernel☆25Updated last month
- A Linux x86/x86-64 tool to trace registers and memory regions.☆37Updated 2 years ago
- IFL - Interactive Functions List (plugin for Binary Ninja)☆23Updated 10 months ago
- genpatch is IDA plugin that generates a python script for patching binary☆33Updated last year
- Easily search LLVM headers for all major versions!☆19Updated 3 months ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- ETrace is a syscall tracing utility powered by eBPF☆25Updated 2 years ago
- Native Rust bindings for @horsicq's Detect-It-Easy☆15Updated 3 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated 3 months ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Python bindings for BochsCPU☆35Updated 2 months ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆34Updated 7 months ago
- Windows Minidump loader for Ghidra☆28Updated 2 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆34Updated last year
- Triton based symbolic emulator☆16Updated 2 years ago
- ☆16Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- ☆12Updated 7 months ago
- Symbolic executor for Binary Ninja's MLIL☆23Updated 7 months ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- ☆23Updated 2 months ago
- ☆18Updated 3 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago