bannsec / revengeLinks
REVerse ENGineering Environment
☆60Updated last year
Alternatives and similar repositories for revenge
Users that are interested in revenge are comparing it to the libraries listed below
Sorting:
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- A tool for finding the one gadget RCE in libc☆76Updated 5 years ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆46Updated 2 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 5 months ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆86Updated 2 years ago
- A library for patching ELFs☆56Updated 4 years ago
- Making Type Info Library (TIL) file for Apache modules☆56Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- A binary ninja plugin to detect crypto☆66Updated last year
- Nampa - FLIRT for (binary) ninjas☆94Updated 6 months ago
- ☆195Updated 3 years ago
- ☆76Updated 3 years ago
- IDA Pro resources, scripts, and configurations☆113Updated last week
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆123Updated last year
- ☆72Updated 3 years ago
- A PCode Emulator for Ghidra.☆109Updated 4 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆89Updated 6 years ago
- Binary Ninja Syscall Annotator☆44Updated 3 years ago
- Lepton is a Lightweight ELF Parsing Tool that was designed specifically for analyzing and editing binaries with damaged or corrupted ELF …☆35Updated 4 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Updated 5 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- A gdb like debugger that provide a runtime env to unicorn emulator and additionals features!☆193Updated 2 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆83Updated 5 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 5 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆29Updated 4 years ago
- Plugin to embed Ghidra Decompiler into Binary Ninja☆97Updated 3 years ago