mit-ll / LO-PHI
Low-Observable Physical Host Instrumentation: A suite of tools supporting introspection and semantic gap reconstruction for both physical and virtual machines.
☆29Updated 8 years ago
Alternatives and similar repositories for LO-PHI:
Users that are interested in LO-PHI are comparing it to the libraries listed below
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- A library for performing memory forensics over the IEEE 1394 interface.☆18Updated 6 years ago
- Memory forensics of virtualization environments☆46Updated 10 years ago
- ☆24Updated 9 years ago
- Triton based R2 plugin for concolic execution and total control☆31Updated 6 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆45Updated 2 years ago
- ☆32Updated 9 months ago
- Tracing framework for full system simulators☆55Updated 9 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- REIL translation library☆36Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆83Updated 8 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Updated 7 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆33Updated 3 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆24Updated 3 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Reverse Engineering tool for Ethereum EVM☆19Updated 8 years ago
- lte security☆41Updated 9 years ago
- ☆22Updated 6 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- Recon materials☆27Updated 7 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- ☆28Updated 2 years ago
- Python repository containing parsed standard C library function and argument information☆26Updated 6 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago