domenukk / dragondanceView external linksLinks
Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns
☆20Nov 2, 2024Updated last year
Alternatives and similar repositories for dragondance
Users that are interested in dragondance are comparing it to the libraries listed below
Sorting:
- ☆13Jun 20, 2022Updated 3 years ago
- ☆19Oct 25, 2024Updated last year
- binary ninja related code☆37Mar 27, 2025Updated 10 months ago
- Python bindings for BochsCPU☆38Aug 10, 2025Updated 6 months ago
- Pishi is a code coverage tool like kcov for macOS.☆75Apr 17, 2025Updated 9 months ago
- A graphics library for creating GUI applications using GDI.☆13Apr 13, 2024Updated last year
- ☆21Sep 25, 2023Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121May 1, 2024Updated last year
- Re-implementation of Apple's Continuity Protocol☆19Dec 5, 2019Updated 6 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- ☆23Mar 6, 2023Updated 2 years ago
- PoC code using debugfs to store files in memory and execute them☆27May 25, 2018Updated 7 years ago
- PDB Rewriting Rust Library☆27Apr 26, 2024Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Oct 2, 2022Updated 3 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 5 months ago
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Jul 6, 2023Updated 2 years ago
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- ☆35Feb 4, 2026Updated last week
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 4 months ago
- Coverage-guided Fuzzing as Online Stochastic Control☆58Nov 7, 2024Updated last year
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- ☆25Feb 6, 2024Updated 2 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- ☆72Jan 29, 2026Updated 2 weeks ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59May 20, 2025Updated 8 months ago
- ☆30Dec 4, 2018Updated 7 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- Redirect spawned iOS application stdout and stderr to pty☆29Jan 29, 2025Updated last year
- Demo exploit code for CVE-2020-27904, a tfp0 bug.☆68Apr 29, 2021Updated 4 years ago
- A DBI tool to discover heap memory related bugs☆126Jun 25, 2018Updated 7 years ago
- ☆33Nov 14, 2025Updated 3 months ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Jun 27, 2022Updated 3 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆133Jun 7, 2024Updated last year
- Some 'one-line' frida api to avoid code recycling here and there☆28Jul 8, 2019Updated 6 years ago