icchy / peLinks
simple PE parser
☆12Updated 8 years ago
Alternatives and similar repositories for pe
Users that are interested in pe are comparing it to the libraries listed below
Sorting:
- Kernel debugger using Timeless Debugging method.☆74Updated 8 years ago
- Simple high-interactive client honeypot☆25Updated 8 years ago
- gdbserver implementation on BitVisor☆25Updated 8 years ago
- Extension for GDB☆108Updated last year
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Updated 3 months ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 7 years ago
- ☆16Updated 8 years ago
- ☆21Updated 9 years ago
- Windows API tracer for malware (oldname: unitracer)☆120Updated 8 years ago
- KVM-based memory access recorder☆20Updated 7 years ago
- ☆105Updated 10 years ago
- ROPChain generator.☆40Updated 7 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- ☆10Updated 9 years ago
- Some stuff for CTF.☆11Updated 6 years ago
- Analyzing Rig Exploit Kit☆50Updated 8 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- ☆81Updated 8 years ago
- ☆13Updated 3 months ago
- Past presentation materials☆10Updated 7 years ago
- Some stuffs for CODE BLUE 2016☆23Updated 9 years ago
- Mozilla fork of the American Fuzzy Lop repo☆47Updated 6 years ago
- KLEE-TAINT - Klee with taint analysis support☆70Updated 8 years ago
- ☆113Updated 8 years ago
- Valgrind for kernel mode software.☆26Updated 9 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Updated 7 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆65Updated 5 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 13 years ago