An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
☆14Sep 12, 2019Updated 6 years ago
Alternatives and similar repositories for IDA_Wrapper
Users that are interested in IDA_Wrapper are comparing it to the libraries listed below
Sorting:
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- ☆28Dec 17, 2025Updated 2 months ago
- ☆40Feb 3, 2026Updated 3 weeks ago
- Qiling Advanced Binary Emulation framework☆23Apr 4, 2020Updated 5 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 9 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- ☆14Sep 11, 2019Updated 6 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- LLVM with SGX support☆13Feb 5, 2018Updated 8 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- on Mac 10.12.2☆20Aug 3, 2018Updated 7 years ago
- Materi praktikum KOM311 Sistem Operasi☆15Nov 14, 2023Updated 2 years ago
- Exploits from the Finding and Preventing Bugs in JavaScript Bindings paper☆10May 22, 2017Updated 8 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆58Jan 15, 2025Updated last year
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Show syscall information for different architectures☆15Aug 26, 2017Updated 8 years ago
- CTF pwn工具,一个快速搭建任何版本环境的工具、使用chroot具备环境隔离、ida自动加载DWARF、被调试程序输入输出重定向等功能☆16Dec 16, 2020Updated 5 years ago
- LCTF 2018 Platform☆16Oct 3, 2023Updated 2 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- DC28CTF challenge parallel-af. Dataflow machine.☆59Aug 10, 2020Updated 5 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- A mirror of the ChakraCore wiki to enable pull requests on the Wiki.☆26Apr 30, 2024Updated last year
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆215Sep 17, 2021Updated 4 years ago
- ☆25Jul 19, 2024Updated last year
- vendor☆17Feb 7, 2017Updated 9 years ago
- IDA script for parsing kallsyms☆86Dec 8, 2025Updated 2 months ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- ☆20May 27, 2020Updated 5 years ago
- ☆19May 23, 2019Updated 6 years ago