echel0nn / having-fun-with-qiling
qiling framework examples
☆15Updated 3 years ago
Alternatives and similar repositories for having-fun-with-qiling:
Users that are interested in having-fun-with-qiling are comparing it to the libraries listed below
- This repo contain Android malware samples and analysis☆13Updated 3 years ago
- ☆26Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- The Dumb Network Fuzzer☆19Updated last year
- Our team's CTF writeups☆12Updated 5 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- winafl with mopt mutators and afl fast power schedulers.☆20Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 2 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- ☆27Updated 4 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- My notes about Genyatyk VM crackme☆27Updated 4 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- ☆11Updated 4 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆34Updated 3 years ago
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Updated 4 years ago
- ☆13Updated 4 years ago
- A repository for my conference presentations☆35Updated 4 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆15Updated 2 years ago
- ☆73Updated 2 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- ☆12Updated 2 years ago