bnbdr / ida-bpf-processorLinks
BPF Processor for IDA Python
☆52Updated 6 years ago
Alternatives and similar repositories for ida-bpf-processor
Users that are interested in ida-bpf-processor are comparing it to the libraries listed below
Sorting:
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- ☆17Updated 6 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- Futile attempt to solve the Tigress challenges using angr☆26Updated 6 years ago
- just an experiment☆21Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- ☆13Updated 4 years ago
- ☆31Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- [CVE-2017-10235] Description and PoC of VirtualBox E1000 device Buffer Overflow☆34Updated 7 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 4 months ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆30Updated 4 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 9 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆26Updated last year
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆124Updated last year
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆83Updated 5 years ago