ATrace is a tool for tracing execution of binaries on Windows.
☆240Nov 19, 2025Updated 3 months ago
Alternatives and similar repositories for EhTrace
Users that are interested in EhTrace are comparing it to the libraries listed below
Sorting:
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- ☆236May 31, 2018Updated 7 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Codemap☆127Jan 13, 2017Updated 9 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- A branch-monitor-based solution for process monitoring.☆138Feb 9, 2020Updated 6 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆133Oct 10, 2014Updated 11 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Jul 22, 2016Updated 9 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- CaptainHook is perfect x86/x64 hook environment☆106Feb 26, 2017Updated 9 years ago
- An instruction trace visualisation tool for dynamic program analysis☆370Dec 8, 2022Updated 3 years ago
- An amd64 symbolic emulator☆314Aug 28, 2021Updated 4 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Apr 13, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆383Apr 17, 2017Updated 8 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Nov 26, 2016Updated 9 years ago
- A pintool in order to unpack malware☆238Jul 30, 2016Updated 9 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- Debugger plugin for IDA Pro backed by the Unicorn Engine☆559Jun 20, 2024Updated last year
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆126Jan 15, 2019Updated 7 years ago
- Load a Windows Kernel Driver☆94Jun 7, 2017Updated 8 years ago