emdel / ksfinder
ksfinder - Retrieve exported kernel symbols from physical memory dumps
☆44Updated 8 years ago
Alternatives and similar repositories for ksfinder:
Users that are interested in ksfinder are comparing it to the libraries listed below
- A TE executable format loader for IDA☆28Updated 9 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- ☆38Updated 9 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Updated 8 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- ☆39Updated 12 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Triton based R2 plugin for concolic execution and total control☆30Updated 6 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 8 years ago
- REIL translation library☆36Updated 8 years ago
- Fuzzer☆43Updated 10 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- fcatalog idapython client☆27Updated 8 years ago
- ☆24Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- ☆28Updated 2 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 7 years ago
- ☆33Updated 9 years ago