jordan9001 / dobby2
Build your emulation environment as needed
☆66Updated 4 years ago
Alternatives and similar repositories for dobby2:
Users that are interested in dobby2 are comparing it to the libraries listed below
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆130Updated last year
- A code-searching/completion tool, for IDA APIs☆83Updated 3 months ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆123Updated last year
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆70Updated last year
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆83Updated 5 years ago
- Making Type Info Library (TIL) file for Apache modules☆55Updated 4 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- Alternative API for IDA / Hex-Rays☆74Updated last year
- integration with IDA☆92Updated 3 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆70Updated 5 years ago
- ☆64Updated 5 months ago
- IDA plugin to explore and browse tags☆56Updated 5 years ago
- ☆72Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- ☆47Updated 2 years ago
- Nampa - FLIRT for (binary) ninjas☆94Updated 4 months ago
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- IDA Pro plugin to show functions in a tree view☆115Updated 4 years ago
- This IDAPython script tags subroutines according to their use of imported functions☆73Updated 3 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 5 years ago
- ☆51Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆30Updated 4 years ago
- ☆100Updated 10 months ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- Analyses in IDA/Hex-Rays☆81Updated 2 years ago