A collection of command-line tools based on Dyninst
☆17Jun 3, 2021Updated 4 years ago
Alternatives and similar repositories for dyninst-tools
Users that are interested in dyninst-tools are comparing it to the libraries listed below
Sorting:
- Example usage of Dyninst☆14Feb 16, 2026Updated 2 weeks ago
- This project equips Claude Code with advanced binary analysis capabilities for tasks such as incident response, malware investigation, a…☆32Nov 19, 2025Updated 3 months ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆14Nov 8, 2019Updated 6 years ago
- ☆44Updated this week
- Python API for rewriting GTIRB files☆19Nov 6, 2025Updated 3 months ago
- ☆39Dec 24, 2023Updated 2 years ago
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- Static instrumentation tool for efficient binary-level coverage analysis.☆151Jan 25, 2021Updated 5 years ago
- Dynamic ControlFlow Graph and DataFlow Graph for Binary-based Optimization☆22Jul 5, 2017Updated 8 years ago
- linux memory hacking library☆26May 9, 2020Updated 5 years ago
- DyninstAPI: Tools for binary instrumentation, analysis, and modification.☆817Updated this week
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Feb 26, 2021Updated 5 years ago
- Java taint propagation for java. Define tainted sources, sanitizer methods and sinks via aspects.☆28Oct 11, 2018Updated 7 years ago
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- headless-ida-mcp-server☆30Apr 4, 2025Updated 10 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Updated this week
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆22Dec 28, 2025Updated 2 months ago
- ☆28Dec 3, 2025Updated 3 months ago
- 详细 双语注释版word2vec源码,well-annotated word2vec☆10Oct 3, 2021Updated 4 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Mar 30, 2020Updated 5 years ago
- A library for binary analysis and rewriting☆50Sep 28, 2023Updated 2 years ago
- updated version of autoplay without third party authentication☆10Dec 4, 2020Updated 5 years ago
- ConfFuzz - Fuzzing for Interface Vulnerabilities☆47May 1, 2023Updated 2 years ago
- A replication of the Baldur's Gate 3 Script Extender for MacOS☆24Feb 12, 2026Updated 2 weeks ago
- C++ Wrapper Library for WinAPI, Direct2D, GUIs and often used functionality. Quick and easy to use.☆10Oct 7, 2022Updated 3 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- ☆33Dec 26, 2025Updated 2 months ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Kripke is a simple, scalable, 3D Sn deterministic particle transport code☆40Feb 24, 2026Updated last week
- Windbg Utility Tools based upon PyKD☆42Sep 9, 2020Updated 5 years ago
- A PE32/PE32+ parser written in MASM32☆13Feb 24, 2016Updated 10 years ago
- Plugin for x64dbg☆13Apr 29, 2017Updated 8 years ago
- ☆13Jan 7, 2025Updated last year
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago