Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns
☆20Nov 2, 2024Updated last year
Alternatives and similar repositories for dragondance
Users that are interested in dragondance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python bindings for BochsCPU☆39Aug 10, 2025Updated 7 months ago
- Pishi is a code coverage tool like kcov for macOS.☆76Apr 17, 2025Updated 11 months ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆19Jul 26, 2025Updated 8 months ago
- ☆21Jan 7, 2019Updated 7 years ago
- ☆13Jun 20, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Inlining functions in IDA HexRays using microcode. Abandoned due to official outline support in IDA v8.0☆16Feb 19, 2023Updated 3 years ago
- binary ninja related code☆37Mar 27, 2025Updated last year
- PDB Rewriting Rust Library☆28Apr 26, 2024Updated last year
- A graphics library for creating GUI applications using GDI.☆14Apr 13, 2024Updated last year
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- ☆19Oct 25, 2024Updated last year
- ☆13Dec 27, 2019Updated 6 years ago
- Bulk delete Tweets you have liked on Twitter!☆13Aug 14, 2023Updated 2 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Easy peasy file uploads☆33Aug 29, 2025Updated 7 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121May 1, 2024Updated last year
- Re-implementation of Apple's Continuity Protocol☆19Dec 5, 2019Updated 6 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 5 months ago
- machofile is a module to parse Mach-O binary files☆94Feb 10, 2026Updated last month
- Ghidra RE scripts☆38Feb 5, 2021Updated 5 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 6 months ago
- ☆23Mar 6, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆21Sep 25, 2023Updated 2 years ago
- Memory Tagging ISA extension that can be used by software to enforce memory tag checks on memory loads and stores☆30Mar 20, 2026Updated last week
- Retypd plugin for Ghidra reverse engineering framework from NSA☆28Jul 6, 2023Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Feb 15, 2023Updated 3 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Jul 8, 2019Updated 6 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆32Jan 27, 2026Updated 2 months ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆134Jun 7, 2024Updated last year
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- ☆16Feb 27, 2026Updated last month