bnbdr / ida-bpf-processor
BPF Processor for IDA Python
☆51Updated 6 years ago
Alternatives and similar repositories for ida-bpf-processor:
Users that are interested in ida-bpf-processor are comparing it to the libraries listed below
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- ☆17Updated 5 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- just an experiment☆21Updated 6 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆59Updated 5 years ago
- Futile attempt to solve the Tigress challenges using angr☆26Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 3 months ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Updated 6 years ago
- ☆13Updated 4 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Updated 8 years ago
- Various debugging tools such as %DumpObjects for v8☆54Updated 6 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- Driver Security Analyzer☆51Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- ☆31Updated 4 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 4 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Signedness-Agnostic Strided-Interval☆36Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Android Vulnerability Reports and POCs.☆26Updated 8 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 5 years ago