bnbdr / ida-bpf-processorLinks
BPF Processor for IDA Python
☆52Updated 6 years ago
Alternatives and similar repositories for ida-bpf-processor
Users that are interested in ida-bpf-processor are comparing it to the libraries listed below
Sorting:
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 5 years ago
- Futile attempt to solve the Tigress challenges using angr☆23Updated 6 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 6 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- ☆31Updated 5 years ago
- ☆17Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- Humane API for storing and accessing persistent data in IDA Pro databases☆79Updated 5 years ago
- just an experiment☆22Updated 6 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Experimental opaque predicate detection for IDA Pro☆81Updated 7 years ago
- integration with IDA☆92Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- ☆13Updated 4 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- code emulator base on unicorn engine☆51Updated 7 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆55Updated 5 years ago
- ☆89Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- ☆76Updated 3 years ago
- Recover control flow graph from obfuscated codes☆38Updated 9 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Driver Security Analyzer☆52Updated 4 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 5 years ago
- ☆27Updated 6 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago