FreddieWitherden / libforensic1394
A library for performing memory forensics over the IEEE 1394 interface.
☆18Updated 6 years ago
Alternatives and similar repositories for libforensic1394:
Users that are interested in libforensic1394 are comparing it to the libraries listed below
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- ☆32Updated 10 months ago
- Triton based R2 plugin for concolic execution and total control☆31Updated 6 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- repository with additional materials and source code☆30Updated 8 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- Fetch and set configuration values from IDAPython scripts☆21Updated 4 years ago
- Fuzzer☆43Updated 10 years ago
- ☆13Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Toy binaries to play with -fsanitize=safe-stack/cfi☆9Updated 9 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Updated 6 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- ☆45Updated 7 years ago
- XED based Disassembly Engine☆19Updated 7 years ago
- ☆28Updated 7 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- REIL translation library☆36Updated 8 years ago
- Alfred Workflow to convert hex string to assembly and vice versa☆24Updated 8 years ago
- ☆34Updated 9 years ago
- An instrumentation script based on Frida which leverages Control Flow Guard to intercept indirect calls in CFG-enabled Windows binaries.☆29Updated 9 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- ☆87Updated 9 years ago