andreafioraldi / taint-with-fridaLinks
just an experiment
☆22Updated 6 years ago
Alternatives and similar repositories for taint-with-frida
Users that are interested in taint-with-frida are comparing it to the libraries listed below
Sorting:
- Futile attempt to solve the Tigress challenges using angr☆23Updated 6 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- BPF Processor for IDA Python☆52Updated 6 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- ☆31Updated 5 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- Driver Security Analyzer☆52Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- ☆27Updated 6 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 7 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- ☆30Updated 6 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Updated 8 years ago
- integration with IDA☆92Updated 4 years ago
- macOS Cython IOKit Utility Library☆42Updated 7 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago