d1nn3r / RECLASSIFYLinks
This is an IDA plugin to recover class information from C++ binary.
☆18Updated 5 years ago
Alternatives and similar repositories for RECLASSIFY
Users that are interested in RECLASSIFY are comparing it to the libraries listed below
Sorting:
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- IDAPython / IDC tips and tricks☆38Updated 2 years ago
- ☆41Updated 3 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- IDA (sort of) headless☆25Updated last year
- Static Binary Instrumentation☆120Updated 3 years ago
- An IDA processor for eBPF bytecode☆67Updated 10 months ago
- Dark+ Theme☆49Updated last year
- angr源码分析☆33Updated 5 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆31Updated 3 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- nanoMIPS IDA plugin☆68Updated 3 years ago
- ☆13Updated 3 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Updated 2 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- IDA plugin displaying the P-Code for the current function☆67Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆45Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆28Updated 3 years ago
- ☆10Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- ☆39Updated last month
- An IDA processor for eBPF bytecode☆48Updated 3 years ago
- ☆34Updated 4 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆88Updated 4 years ago
- A collection of POP exploits.☆30Updated 4 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- Driver Security Analyzer☆53Updated 4 years ago
- 基于angr的污点分析引擎☆41Updated 6 years ago