ohjeongwook / iptanalyzerLinks
Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support
☆71Updated 2 years ago
Alternatives and similar repositories for iptanalyzer
Users that are interested in iptanalyzer are comparing it to the libraries listed below
Sorting:
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- Build your emulation environment as needed☆66Updated 4 years ago
- ☆50Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- Full-VM taint analysis with Xen, Intel(R) Processor Trace and Triton.☆41Updated 2 years ago
- haze binary fuzzer☆56Updated last year
- Tool to extract the kallsyms (System.map) from a memory dump☆28Updated 2 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Updated 7 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 10 months ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆126Updated 5 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆79Updated 6 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆72Updated 6 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆48Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆109Updated 4 years ago
- A function tracer☆92Updated 6 years ago
- Target components for kAFL/Nyx Fuzzer☆35Updated last year
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆164Updated 4 years ago
- ☆72Updated 4 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Updated 6 years ago
- Toolkit for Hyper-V security research☆156Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆167Updated 5 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆89Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆127Updated last year