dingelish / dftwinLinks
libdft for win
☆52Updated 12 years ago
Alternatives and similar repositories for dftwin
Users that are interested in dftwin are comparing it to the libraries listed below
Sorting:
- Windows平台下的细粒度污点分析工具☆49Updated 8 years ago
- ☆87Updated 10 years ago
- S2E plugins library☆17Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- Use Intel Pin tools to analysis binary.☆37Updated 10 years ago
- Windows builds for use with angr framework☆29Updated 9 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Updated 11 years ago
- Efficient Multi-threaded Binary Code Control Flow Profiling Pintool☆22Updated 9 years ago
- Crappy Win32k syscall fuzzer☆13Updated 10 years ago
- taint tracer/analysis pintool☆25Updated 11 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- Immunity Debugger Taint Tracer☆20Updated 12 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆96Updated 13 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 5 years ago
- My collection of IDAPython scripts.☆40Updated 9 years ago
- Implementation of a thin hypervisor☆42Updated 9 years ago
- Automatically exported from code.google.com/p/mynav☆30Updated 10 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Updated 7 years ago
- Very WIP taint analysis for DynamoRIO (ARM)☆18Updated 7 years ago
- Git copy of idapython svn repo: https://code.google.com/p/idapython/☆48Updated 11 years ago
- Recover control flow graph from obfuscated codes☆39Updated 10 years ago
- Basic Block Trace: DynamoRIO client☆28Updated 3 years ago
- Code coverage analysis tools for the PIN Toolkit☆60Updated 12 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 7 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 11 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- ☆31Updated 7 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago