hexabeast / SytraceLinks
Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64
☆42Updated 5 years ago
Alternatives and similar repositories for Sytrace
Users that are interested in Sytrace are comparing it to the libraries listed below
Sorting:
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- Plugin to embed Ghidra Decompiler into Binary Ninja☆97Updated 3 years ago
- A library for patching ELFs☆62Updated 5 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features☆171Updated 7 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 8 months ago
- ☆85Updated 3 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- ☆50Updated 3 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆111Updated last year
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- Notes on using the Python bindings for the Unicorn Engine☆80Updated 5 years ago
- ☆72Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated 2 years ago
- ☆43Updated 4 years ago
- Kernel Read Write Execute☆84Updated last year
- A pykd maintenance fork☆65Updated 11 months ago
- A fast execution trace symbolizer for Windows.☆130Updated last year
- A dark Nord theme port for Hex Rays IDA☆103Updated 3 years ago
- ☆82Updated this week
- Abusing exceptions for code execution.☆113Updated 3 years ago
- ☆80Updated 3 years ago
- IDA plugin to pinpoint obfuscated code☆144Updated 3 years ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21Updated 5 years ago
- LLVM pass that obfuscates against symbolic execution☆77Updated 7 years ago
- Write-ups for crackmes and CTF challenges☆53Updated 3 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆100Updated last month
- Small programs and scripts that do not require their own repositories☆139Updated 3 years ago