dcdelia / dbi-detectorLinks
Collection of DBI evasion techniques
☆14Updated 3 years ago
Alternatives and similar repositories for dbi-detector
Users that are interested in dbi-detector are comparing it to the libraries listed below
Sorting:
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆26Updated 4 years ago
- Flex 'em lexers☆40Updated 4 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Updated 3 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆83Updated 2 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- ☆24Updated last year
- Snapshot fuzzing with KVM and LibAFL☆96Updated 2 years ago
- kAFL Fuzzer☆33Updated 3 months ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- ☆13Updated 4 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆72Updated 3 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- ☆53Updated 6 years ago
- ☆71Updated last year
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆26Updated 5 years ago
- Rust bindings for googleprojectzero/TinyInst☆20Updated 2 months ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Updated 5 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Updated 3 years ago
- Utilities for generating dynamic traces☆92Updated 3 months ago
- ☆42Updated 3 years ago
- Super Fast Concolic Execution Engine based on Source Code Taint Tracing☆102Updated 2 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- Futile attempt to solve the Tigress challenges using angr☆23Updated 6 years ago
- A simple pluggable tool to convert an unrolled TritonAST to LLVM-IR, optimize it and get back to TritonAST.☆35Updated 5 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆15Updated 8 years ago