experimentation/code from Tanguy Dubroca (summer 2019)
☆28Aug 10, 2019Updated 6 years ago
Alternatives and similar repositories for wakare
Users that are interested in wakare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- Tools and documentation about 'A Link to the Past' (GBA) internals.☆11Mar 15, 2020Updated 6 years ago
- A Rust doubly-linked intrusive list with Miri tests☆12May 4, 2024Updated last year
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 4 years ago
- A source level debugger for C programs running on ARM Cortex-M parts. Utilizes the *blackmagic* probe and the *Qt* framework☆57Feb 18, 2020Updated 6 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Aug 21, 2022Updated 3 years ago
- Reverse engineering of WEB-PDC001 protocol☆13May 19, 2019Updated 6 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Communication through a serial port or named pipe☆57Jul 19, 2023Updated 2 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Aug 17, 2023Updated 2 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- A code-searching/completion tool, for IDA APIs☆83Jan 22, 2025Updated last year
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Reverse-Engineering Monster Hunter Freedom Unite (PSP)☆15Feb 28, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated last year
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 6 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆90Nov 7, 2025Updated 4 months ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- ☆33Nov 14, 2025Updated 4 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cross-platform CMSIS-DAP access over USB in Python☆14Aug 13, 2015Updated 10 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- ☆15Oct 20, 2019Updated 6 years ago
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆73Jun 15, 2018Updated 7 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Unicorn emulator plugin for Dwarf☆18Aug 4, 2019Updated 6 years ago