icchy / peLinks
simple PE parser
☆12Updated 8 years ago
Alternatives and similar repositories for pe
Users that are interested in pe are comparing it to the libraries listed below
Sorting:
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆35Updated 6 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- KVM-based memory access recorder☆20Updated 6 years ago
- Triton based R2 plugin for concolic execution and total control☆32Updated 6 years ago
- Linux rootkit experimentations☆19Updated 10 years ago
- Simple high-interactive client honeypot☆24Updated 7 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- libs2e.so☆20Updated 4 years ago
- ☆14Updated 7 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- Kernel debugger using Timeless Debugging method.☆73Updated 8 years ago
- ☆32Updated last year
- REIL translation library☆36Updated 9 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Updated 12 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- ☆15Updated 9 years ago
- ☆12Updated 8 years ago
- A console for assemble/disassemble code using capstone/keystone☆31Updated 7 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 7 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- Fetch and set configuration values from IDAPython scripts☆22Updated 4 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Updated 6 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Updated 5 years ago
- Tool to view heap chunks and memory writes (using pintool)☆40Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago