SideChannelMarvels / Stark
Repository of small utilities related to key recovery
☆223Updated 10 months ago
Alternatives and similar repositories for Stark:
Users that are interested in Stark are comparing it to the libraries listed below
- Tools to perform differential fault analysis attacks (DFA).☆320Updated last year
- An OLLVM-CFF Deobfuscation Plugin☆597Updated last year
- Instructions tracing powered by frida☆178Updated 5 years ago
- Scripts for the Ghidra.☆291Updated 3 years ago
- An arm32 ollvm like deofuscator,aim to remove obfuscation made by ollvm like compiler☆227Updated 4 years ago
- Unicorn Emulator Debug Server - Written in Rust, with bindings for C, Go, Java and Python☆359Updated 3 weeks ago
- use angr to deobfuscation☆627Updated 4 months ago
- IDA_Signsrch in Python☆99Updated 4 years ago
- 针对OLLVM的IDA分析插件☆255Updated 8 years ago
- ☆408Updated 3 years ago
- Instruction tracer powered by Frida☆133Updated 2 weeks ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆166Updated 2 years ago
- ☆319Updated last year
- ☆152Updated 5 years ago
- Common IDA scripts for effective Reverse Enginnering☆160Updated last year
- Official Unicorn CPU emulator framework API documentation☆261Updated last year
- ☆193Updated last year
- IDA Frida Plugin for tracing something interesting.☆269Updated last month
- 使用Binary Ninja去除ollvm流程平坦混淆☆418Updated 4 years ago
- android memory access trace utility powered by frida framework☆234Updated 2 years ago
- Human-friendly cross-platform system call tracing and hooking library based on Frida's Stalker☆338Updated last year
- ☆312Updated 8 months ago
- 一个小脚本,用于trace so中native函数的调用。☆503Updated 3 years ago
- IDA Pro plugin for reconstructing original .proto files from binary.☆268Updated 5 months ago
- Some reverse-engineering scripts☆113Updated 5 years ago
- strongR-frida☆199Updated 3 years ago
- A gdb like debugger that provide a runtime env to unicorn emulator and additionals features!☆192Updated last year
- ☆111Updated 6 years ago
- Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions☆306Updated last year
- Engine used by jnitrace to intercept JNI API calls.☆313Updated last year