feliam / pysymemuView external linksLinks
An amd64 symbolic emulator
☆314Aug 28, 2021Updated 4 years ago
Alternatives and similar repositories for pysymemu
Users that are interested in pysymemu are comparing it to the libraries listed below
Sorting:
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Path based Dynamic Analysis☆118Mar 25, 2017Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- yet another tool for analysing binaries☆490Feb 17, 2025Updated 11 months ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Jul 22, 2016Updated 9 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆324Aug 12, 2019Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- ☆159Feb 23, 2015Updated 10 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- ☆236May 31, 2018Updated 7 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Nov 19, 2025Updated 2 months ago
- Certified Edible Dinosaurs official CTF toolkit☆120Apr 2, 2018Updated 7 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- dynamic binary analysis via platform emulation☆904Jun 1, 2023Updated 2 years ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- The Kam1n0 Assembly Analysis Platform☆625Mar 2, 2023Updated 2 years ago
- Release Branches for MoFlow☆307Nov 10, 2015Updated 10 years ago
- Dynamic IDA Enrichment☆476Mar 2, 2022Updated 3 years ago
- Semantic Binary Code Analysis Framework☆124Sep 28, 2015Updated 10 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆881Nov 21, 2023Updated 2 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆417Jun 6, 2018Updated 7 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- This is the archived S2E 1.0 repo. We do not maintain it anymore.☆315Jun 25, 2020Updated 5 years ago
- Python Exploration with Z3☆340Dec 12, 2025Updated 2 months ago
- A decompiler with multiple backend support, written in Python. Works with IDA and Capstone.☆532Jan 28, 2016Updated 10 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- An optimizing decompiler☆762Mar 29, 2021Updated 4 years ago