echel0nn / having-fun-with-qilingLinks
qiling framework examples
☆16Updated 3 years ago
Alternatives and similar repositories for having-fun-with-qiling
Users that are interested in having-fun-with-qiling are comparing it to the libraries listed below
Sorting:
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆28Updated 5 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- This repo contain Android malware samples and analysis☆13Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- My notes about Genyatyk VM crackme☆26Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- REVerse ENGineering Environment☆62Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- A collection of scripts to aid in reverse engineering and exploit development.☆24Updated 3 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- Anti-reverse Compilation☆34Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- ☆76Updated 3 years ago
- ☆85Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 3 years ago
- ☆72Updated 4 years ago
- ☆36Updated 4 years ago
- ☆78Updated 5 months ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago