emdel / ksfinder
ksfinder - Retrieve exported kernel symbols from physical memory dumps
☆44Updated 8 years ago
Alternatives and similar repositories for ksfinder:
Users that are interested in ksfinder are comparing it to the libraries listed below
- Memory awesomeness.☆29Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- A TE executable format loader for IDA☆28Updated 9 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- ☆24Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆30Updated 6 years ago
- ☆14Updated 9 years ago
- BinCrowd Plugin for IDA Pro☆42Updated 13 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- ☆61Updated 9 years ago
- REIL translation library☆36Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- ☆38Updated 9 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- fcatalog idapython client☆27Updated 8 years ago
- Binary Analysis Platform☆73Updated 11 years ago
- Test case minimizer for afl-fuzz☆26Updated 7 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- A pin tool to visualise heap operations☆21Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆67Updated 9 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago