S2E / guest-toolsLinks
Tools that run inside the guest
☆11Updated 6 years ago
Alternatives and similar repositories for guest-tools
Users that are interested in guest-tools are comparing it to the libraries listed below
Sorting:
- ☆14Updated 7 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Updated 4 years ago
- ☆12Updated 8 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Updated 10 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆49Updated 5 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 7 years ago
- radare2 cLEMENCy plugins☆24Updated 8 years ago
- Fetch and set configuration values for IDA Plugins☆25Updated 2 months ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Updated 11 years ago
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- vm -- code interpreter☆25Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- 代码虚拟化与自动化分析☆64Updated 8 years ago
- expansion of afl-unicorn using c++☆28Updated 6 years ago
- AllMemPro☆46Updated 8 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- ROP database plugin for IDA☆32Updated 7 years ago
- Recover control flow graph from obfuscated codes☆37Updated 10 years ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Updated 7 years ago
- ☆18Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 7 years ago
- Create and use macros in IDA's CLIs☆66Updated last month
- Dynamic binary analysis via platform emulation☆12Updated 7 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Updated 7 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- ☆38Updated 3 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Updated 9 years ago
- Self-modifying Code de-obfuscation☆17Updated 8 years ago