N0fix / ArianeLinks
Resolve symbols from release rust binaries on Windows
☆20Updated last year
Alternatives and similar repositories for Ariane
Users that are interested in Ariane are comparing it to the libraries listed below
Sorting:
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆61Updated last month
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated last month
- ☆89Updated 4 months ago
- Get information about stripped rust executables☆31Updated last month
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆116Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆94Updated 8 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆79Updated 11 months ago
- Cross-platform harnessing framework designed for Nyx-based fuzzers☆19Updated 4 months ago
- Rust symbol recovery tool☆56Updated last month
- ☆62Updated 3 months ago
- Sample Rust crate used to implement a VBS enclave in Rust☆34Updated 2 weeks ago
- ☆28Updated 3 years ago
- ☆74Updated 11 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆62Updated 7 months ago
- ☆81Updated last month
- Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib☆174Updated 2 weeks ago
- Modular and extensible library for Virtual Machine Introspection☆105Updated last month
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 4 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy and more☆65Updated last month
- Radamsa fuzzer ported to rust lang☆154Updated 3 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆53Updated last week
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆110Updated last year
- How to retro theme your Ghidra☆35Updated 7 months ago
- An educational Bochs-based snapshot fuzzer project☆182Updated 3 weeks ago
- ☆18Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆45Updated 3 weeks ago
- examples of using radius2 to solve reversing challenges☆35Updated 5 months ago
- ☆47Updated 3 years ago