domenukk / dragondance
Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns
☆19Updated 4 months ago
Alternatives and similar repositories for dragondance:
Users that are interested in dragondance are comparing it to the libraries listed below
- Python bindings for BochsCPU☆35Updated last month
- ☆12Updated 2 years ago
- BINARLY Research Tools and PoCs☆36Updated 5 months ago
- ☆11Updated 5 months ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- javascript extension of windbg for hacker.☆15Updated last year
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- ☆14Updated 3 years ago
- weggli ruleset scanner for source code and binaries☆25Updated 3 months ago
- ☆34Updated 9 months ago
- Repository for Flare-On challenges and solutions/code☆9Updated 3 months ago
- Diaphora Machine Learning tools and datasets☆19Updated 6 months ago
- SPI flash read MitM attack PoC☆37Updated 2 years ago
- ☆23Updated last month
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆33Updated last month
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last month
- Slides about HyperDbg☆30Updated 9 months ago
- TrustZone Trusted Application 0-Days by Design☆18Updated 4 months ago
- Here I store my proof of concepts☆14Updated 6 months ago
- ☆32Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 3 months ago
- ☆18Updated 3 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Python interface for Binexport, the Bindiff export format☆14Updated last month
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆15Updated last year
- ☆28Updated last month
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year