Python wrapper for the Windows CDB Debugger
☆20Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for pycdb
Users that are interested in pycdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- ☆22Mar 23, 2016Updated 10 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- ☆10Dec 10, 2025Updated 3 months ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Some glue facilitating remote use of IDA (the Interactive DisAssembler) Python API.☆77Jul 14, 2020Updated 5 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Functions Catalog☆28Jul 10, 2019Updated 6 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- A smart file fuzzer.☆26Aug 19, 2016Updated 9 years ago
- Wadi Fuzzing Harness☆127Feb 6, 2017Updated 9 years ago
- ☆16Mar 23, 2018Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago