Implementation trade-offs in using Intel Pin for instruction tracing of complex programs
☆15Oct 16, 2019Updated 6 years ago
Alternatives and similar repositories for PinCFGReconstructor
Users that are interested in PinCFGReconstructor are comparing it to the libraries listed below
Sorting:
- ☆12Jun 14, 2017Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Dynamic tracing in Linux using fast tracepoints☆11Aug 30, 2018Updated 7 years ago
- Unofficial mirror of☆11Feb 2, 2018Updated 8 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- messing around writing reversing tools in clojure☆15Nov 9, 2017Updated 8 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- Dispar - Cross-platform Disassemling binary Parser☆20Nov 21, 2021Updated 4 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- taint tracer/analysis pintool☆26Jul 3, 2014Updated 11 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- ☆41May 23, 2017Updated 8 years ago
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- Pin-Based Constant Execution Checker (Pin-based CEC)☆20Mar 31, 2025Updated 11 months ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- Basic Block Trace: DynamoRIO client☆29Dec 19, 2021Updated 4 years ago
- Lightweight Symbolic Execution Engine☆23Jul 1, 2015Updated 10 years ago
- ☆30Jan 6, 2021Updated 5 years ago
- An automatic framework to remove unneeded and unsafe code from Bluetooth stacks of Android and Linux, using both source code analysis (LL…☆24Jul 1, 2022Updated 3 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Nov 19, 2017Updated 8 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- Bootloader research tools (very much a work in progress)☆37Apr 5, 2019Updated 6 years ago
- A LLVM Pass with runtime dataflow sanitization☆32Mar 28, 2019Updated 6 years ago
- Corana is a Dynamic Symbolic Execution Engine for ARM Cortex-M aiming to incrementally reconstruct the precise Control Flow Graph (CFG) o…☆29Mar 6, 2024Updated last year
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago