Triton based R2 plugin for concolic execution and total control
☆33Nov 26, 2018Updated 7 years ago
Alternatives and similar repositories for pimp
Users that are interested in pimp are comparing it to the libraries listed below
Sorting:
- ☆30May 23, 2017Updated 8 years ago
- Symbolic Execution Tool in r2☆106Jan 21, 2022Updated 4 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- deprecated☆27Mar 20, 2019Updated 6 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- bil verification tool☆12Jun 30, 2022Updated 3 years ago
- Grep-like WinDbg extension☆45Apr 7, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- x86 Dynamic Binary Translator Library☆34Dec 19, 2020Updated 5 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- S2E Core Engine Library☆15Jan 7, 2020Updated 6 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- ☆41May 23, 2017Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Aug 14, 2023Updated 2 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Apr 8, 2022Updated 3 years ago
- IDAPython plugin for finding Xrefs from a function☆48Jul 14, 2016Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- 論文を読んだふりしてライバルに差をつけろ☆17Dec 31, 2016Updated 9 years ago
- C++ standard proposals☆16Jan 30, 2026Updated last month
- Gdb Extension Framework is a bunch of python code around the gdb api.☆50Jun 12, 2021Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Sep 5, 2017Updated 8 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- Translator from asm to C, but not decompiler. Something between compiler and decompiler.☆56Aug 31, 2021Updated 4 years ago
- Dynamic instrumentation of the Linux kernel☆41Feb 24, 2015Updated 11 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Dec 5, 2018Updated 7 years ago
- Processes and metrics for assessing obfuscation effectiveness☆55Jan 26, 2017Updated 9 years ago