A binary ninja plugin that finds format string vulnerabilities
☆25Sep 29, 2020Updated 5 years ago
Alternatives and similar repositories for format-string-finder-binja
Users that are interested in format-string-finder-binja are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 4 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 9 months ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 7 years ago
- Binary Ninja Plugin for devi - see https://github.com/murx-/devi/ for devi details☆20Jan 17, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆18May 9, 2020Updated 5 years ago
- Automatic Vulnerability Discovery☆38Mar 30, 2019Updated 7 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- ☆18Aug 7, 2020Updated 5 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Feb 15, 2023Updated 3 years ago
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" files☆10Sep 5, 2024Updated last year
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Fuzz-introspector has moved (but is actively maintained) - please follow the project here https://github.com/ossf/fuzz-introspector☆14Dec 3, 2021Updated 4 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Geeklet for Spotify player, shows track info and artwork☆12Dec 14, 2020Updated 5 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Jun 27, 2022Updated 3 years ago
- Kriss Kross Jump-themed SEGA Genesis ROM CTF Challenge (Because why not?)☆15May 5, 2019Updated 6 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated last year
- ☆27Jan 3, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- UI plugin integrating Kaitai Struct (kaitai.io) in Binja☆45Apr 18, 2025Updated 11 months ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆90Nov 7, 2025Updated 4 months ago
- Embedded software (firmware) for the laser system and components, including configuration files☆27Mar 19, 2024Updated 2 years ago
- Interface GDB-GEF with Binary Ninja☆58Mar 27, 2021Updated 5 years ago
- ☆15Jul 25, 2019Updated 6 years ago
- A Binary Ninja plugin for vulnerability research.☆301Sep 7, 2024Updated last year
- A Rust doubly-linked intrusive list with Miri tests☆12May 4, 2024Updated last year
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆18Dec 16, 2024Updated last year
- Binary Ninja plugin for visualizing coverage over time☆25Jan 15, 2022Updated 4 years ago
- Passive ICS Network Scanner based on MAC Address Detection☆21Oct 26, 2020Updated 5 years ago
- ☆12Oct 15, 2024Updated last year
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- ☆27Oct 19, 2018Updated 7 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago