immunityinc / libptraceLinks
An event driven multi-core process debugging, tracing, and manipulation framework.
☆175Updated 5 years ago
Alternatives and similar repositories for libptrace
Users that are interested in libptrace are comparing it to the libraries listed below
Sorting:
- Decompiler for x86 and x86-64 ELF binaries☆219Updated 6 years ago
- ☆172Updated 3 years ago
- Unlinks a binary executable to get back a set of .o object files for further transformation and re-linking.☆159Updated 3 years ago
- clang-based search engine for C/C++ data structures, classes, prototypes & macros☆103Updated 8 months ago
- Uncovering Class Hierarchies in C++ Programs☆127Updated 2 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- Kernel-based debugger for Linux applications☆75Updated 3 years ago
- DynamoRIO coverage visualization for cutter☆61Updated 2 years ago
- Rewriting functions in compiled binaries using McSema☆89Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 11 months ago
- A hypervisor for fuzzing built with WHVP and Bochs☆377Updated 6 years ago
- ☆74Updated 4 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆135Updated 6 years ago
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆108Updated 7 years ago
- A user-friendly fuzzing and crash triage tool for Windows☆131Updated 5 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆218Updated 4 years ago
- add symbols back into a stripped ELF binary (~strip)☆173Updated 7 years ago
- ELF Unstrip Tool☆105Updated 9 years ago
- Obfuscates dynamic symbol table☆134Updated 6 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆129Updated 3 years ago
- Binary code coverage visualizer plugin for Ghidra☆292Updated last year
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- Safely execute an arbitrary x86 instruction☆180Updated last year
- grap: define and match graph patterns within binaries☆154Updated 3 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆305Updated 6 years ago
- radare2 + miasm2 = ♥☆103Updated 5 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆201Updated 6 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆321Updated 5 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 4 years ago
- Cross Architecture Shellcode in C☆203Updated 8 years ago