ProXBBE (Protocol eXtraction By Binary Execution)
☆31Sep 21, 2017Updated 8 years ago
Alternatives and similar repositories for proxbbe
Users that are interested in proxbbe are comparing it to the libraries listed below
Sorting:
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Slides and very basic examples☆112May 17, 2017Updated 8 years ago
- print information from LLVM dataflow analyses☆13Jan 22, 2020Updated 6 years ago
- ☆11May 19, 2017Updated 8 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- Playground for testing feedback☆16Aug 12, 2020Updated 5 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- ☆26Oct 13, 2015Updated 10 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- LLVM Assembler adding Debug Information at IR Level.☆33Oct 31, 2018Updated 7 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- libfuzzerfication - fuzzing for the rest of us!☆61Jan 9, 2017Updated 9 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Sep 16, 2022Updated 3 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- grap: define and match graph patterns within binaries☆174Mar 3, 2021Updated 4 years ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- C++ wrapper around KLEE and AFL for intelligent, coverage guided fuzzing. Developed while doing research at MWR Infosecurity☆18Aug 1, 2018Updated 7 years ago
- Event Tracing for Windows Custom Events☆21Jan 28, 2015Updated 11 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- Educational tools for Binary Ninja☆20Jul 18, 2018Updated 7 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Jul 19, 2017Updated 8 years ago
- Symbolic Execution Tool in r2☆106Jan 21, 2022Updated 4 years ago
- A library for binary analysis and rewriting☆50Sep 28, 2023Updated 2 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago