RKX1209 / kmemlearn
KVM-based memory access recorder
☆20Updated 6 years ago
Alternatives and similar repositories for kmemlearn:
Users that are interested in kmemlearn are comparing it to the libraries listed below
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆23Updated 7 years ago
- gdbserver implementation on BitVisor☆25Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 6 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- ROPChain generator.☆38Updated 6 years ago
- Kernel debugger using Timeless Debugging method.☆72Updated 8 years ago
- Valgrind for kernel mode software.☆25Updated 8 years ago
- VMI on BitVisor to detect hidden rootkits.☆26Updated 8 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- libs2e.so☆20Updated 4 years ago
- simple PE parser☆12Updated 7 years ago
- A toy hypervisor.☆25Updated last year
- S2E Core Engine Library☆15Updated 5 years ago
- Simple high-interactive client honeypot☆24Updated 7 years ago
- ☆10Updated 8 years ago
- ☆14Updated 7 years ago
- Proof of Concept of TrustZone exploit☆16Updated 5 years ago
- Nintendo switch debugger for radare2☆13Updated 6 years ago
- hypervisorなmemo☆12Updated 5 years ago
- Make the Windows API in Ghidra easy to read and informative.☆27Updated 3 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Updated 5 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆17Updated 7 years ago
- Linux rootkit experimentations☆18Updated 9 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆12Updated last year
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- Triton based R2 plugin for concolic execution and total control☆30Updated 6 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆16Updated 6 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Updated 7 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Updated 6 years ago