Collection of DBI evasion techniques
☆16Jan 25, 2022Updated 4 years ago
Alternatives and similar repositories for dbi-detector
Users that are interested in dbi-detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆25Dec 8, 2021Updated 4 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated 2 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆16Dec 12, 2014Updated 11 years ago
- QEMU-based Memory Sanitizer for binary software.☆23Nov 19, 2025Updated 4 months ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- A quick-and-easy web CTF platform for people who love ASCII and minimalism.☆14Jun 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆65Aug 11, 2021Updated 4 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Dec 22, 2021Updated 4 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆19Jul 25, 2021Updated 4 years ago
- z64 Simulator☆19Nov 26, 2024Updated last year
- Ghidra Emulates Functions☆57Oct 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆28Feb 3, 2021Updated 5 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆94Jan 6, 2026Updated 3 months ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- CVE-2022-24122 Proof of Concept