cseagle / ida_clemencyView external linksLinks
IDA cLEMENCy Tools
☆63Jul 31, 2017Updated 8 years ago
Alternatives and similar repositories for ida_clemency
Users that are interested in ida_clemency are comparing it to the libraries listed below
Sorting:
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- Writeups of CTF challenges I do☆13Sep 29, 2019Updated 6 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- A purely academic effort to compile a subset of C to a 3-symbol, 5-tape simulated turing machine ruleset.☆11Sep 17, 2011Updated 14 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- Implementations of program analysis tools with a focus on machine code☆209Sep 21, 2014Updated 11 years ago
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- rebuild ollydbg☆20Feb 15, 2017Updated 8 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- Function redirection via ELF tricks.☆164Jun 30, 2015Updated 10 years ago
- TaintAll, a taint analysis and concolic execution tool☆31Jan 2, 2017Updated 9 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Jan 21, 2020Updated 6 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Scripts for Binary Ninja☆258Apr 11, 2023Updated 2 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Aug 8, 2017Updated 8 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Apr 2, 2018Updated 7 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- Multiple producer multiple consumer queue template using C++11 atomics.☆14Aug 26, 2021Updated 4 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Sep 27, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 8 years ago