echel0nn / having-fun-with-qilingLinks
qiling framework examples
☆16Updated 3 years ago
Alternatives and similar repositories for having-fun-with-qiling
Users that are interested in having-fun-with-qiling are comparing it to the libraries listed below
Sorting:
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆28Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆27Updated 4 years ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated 4 months ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- A library for patching ELFs☆56Updated 4 years ago
- ☆31Updated 2 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- Our team's CTF writeups☆10Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆53Updated 5 years ago
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- ☆14Updated 2 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆15Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 3 years ago
- ☆32Updated 5 months ago
- Fuzzing v8 with dharma and libfuzzer☆13Updated 5 years ago
- ☆11Updated 4 years ago
- idapm is IDA Plugin Manager via GitHub Repository.☆59Updated 4 years ago