domenukk / qilingLinks
Qiling Advanced Binary Emulation framework
☆23Updated 5 years ago
Alternatives and similar repositories for qiling
Users that are interested in qiling are comparing it to the libraries listed below
Sorting:
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- Library to wrap all file calls when fuzzing with AFL++☆51Updated 2 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Updated 8 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Updated 7 years ago
- Solutions for my 34C3CTF challenges☆21Updated 6 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 4 months ago
- ☆17Updated 6 years ago
- run AFL with pintool☆66Updated 5 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- ☆30Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- Futile attempt to solve the Tigress challenges using angr☆26Updated 6 years ago
- ☆31Updated 4 years ago
- ☆74Updated 7 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++☆44Updated 3 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago