mephi42 / memtraceLinks
Valgrind tool for tracing memory accesses
☆13Updated 5 months ago
Alternatives and similar repositories for memtrace
Users that are interested in memtrace are comparing it to the libraries listed below
Sorting:
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆37Updated 5 years ago
- ☆31Updated 4 years ago
- ROP database plugin for IDA☆31Updated 7 years ago
- Evaluating function diffing existing techniques☆12Updated 6 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Updated 6 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆47Updated 5 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Updated 3 years ago
- Plugins for IDA Pro and Hex-Rays☆42Updated 7 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- x86/x64 architecture plugin☆40Updated last year
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Plugin adding multi-binary project support to IDA Pro (WIP)☆27Updated 8 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆54Updated 5 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- ☆29Updated 4 years ago
- IDAPython script in order to auto-rename subs☆20Updated 8 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- IDA Plugin - GraphSlick☆53Updated 10 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆23Updated 2 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 8 years ago
- ARMv7 architecture plugin☆40Updated last year
- S2E Core Engine Library☆15Updated 5 years ago