gdbinit / TELoader
A TE executable format loader for IDA
☆28Updated 9 years ago
Alternatives and similar repositories for TELoader:
Users that are interested in TELoader are comparing it to the libraries listed below
- Vulnerability research and development.☆25Updated 9 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 9 years ago
- XED based Disassembly Engine☆19Updated 7 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Uncategorized utilities☆57Updated 6 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- Python bindings for Intel's XED☆29Updated 10 months ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- Memory awesomeness.☆29Updated 10 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆68Updated 11 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 11 years ago
- Betraying the BIOS: Where the Guardians of the BIOS are Failing☆59Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- ☆28Updated 2 years ago
- ☆38Updated 9 years ago
- ☆25Updated 9 years ago