hexabeast / SytraceLinks
Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64
☆42Updated 5 years ago
Alternatives and similar repositories for Sytrace
Users that are interested in Sytrace are comparing it to the libraries listed below
Sorting:
- Slides, recordings and materials of my public presentations, talks and workshops.☆79Updated this week
- Plugin to embed Ghidra Decompiler into Binary Ninja☆97Updated 3 years ago
- pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features☆172Updated 5 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆66Updated 6 months ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆108Updated last year
- IDA plugin to pinpoint obfuscated code☆142Updated 3 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Notes on using the Python bindings for the Unicorn Engine☆80Updated 5 years ago
- ☆72Updated 4 years ago
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- Abusing exceptions for code execution.☆113Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- ☆82Updated 2 years ago
- ☆84Updated 3 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆122Updated last year
- ☆50Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- Kernel Read Write Execute☆83Updated last year
- ☆43Updated 3 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 6 years ago
- Hex-Rays Block Highlighter plugin for IDA to highlight if/for/do/switch/while blocks☆62Updated 3 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- Anti-reverse Compilation☆34Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- LLVM pass that obfuscates against symbolic execution☆75Updated 7 years ago
- Xyntia, the black-box deobfuscator☆83Updated 3 weeks ago
- ☆76Updated 4 years ago