avatartwo / avatar-pandaView external linksLinks
DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda
☆13Mar 19, 2021Updated 4 years ago
Alternatives and similar repositories for avatar-panda
Users that are interested in avatar-panda are comparing it to the libraries listed below
Sorting:
- QEmu backend for avatar²☆22Mar 29, 2025Updated 10 months ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 6 years ago
- gnu gcov like tool☆12Jun 18, 2015Updated 10 years ago
- Builds Data Provenance Graph for Multi-Threaded Programms using tthread and Intel Pt.☆14Jun 3, 2016Updated 9 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 5 years ago
- scripts, snippets etc.☆24Jul 17, 2025Updated 6 months ago
- ☆20Nov 6, 2024Updated last year
- ☆74Aug 4, 2022Updated 3 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Jul 30, 2016Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆27Dec 27, 2021Updated 4 years ago
- Classes with architecture-specific information useful to other projects.☆95Feb 9, 2026Updated last week
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- ☆23May 11, 2017Updated 8 years ago
- ☆45Feb 24, 2018Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆30May 24, 2013Updated 12 years ago
- Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical…☆30Jul 12, 2016Updated 9 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- Hopper Disassembler SDK (unofficial repository)☆34Jan 5, 2021Updated 5 years ago
- Joomla 3.2 to 3.4.4 Remote SQL Injection Mass Exploit☆29Aug 17, 2021Updated 4 years ago
- Open source tools for realistic-behaving electric grid honeynets☆60Mar 23, 2015Updated 10 years ago
- ☆27May 29, 2015Updated 10 years ago
- ☆26Sep 21, 2022Updated 3 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago