paulmehta / AblationView external linksLinks
Augmenting Static Analysis Using Pintool: Ablation
☆39Aug 4, 2016Updated 9 years ago
Alternatives and similar repositories for Ablation
Users that are interested in Ablation are comparing it to the libraries listed below
Sorting:
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- A branch-monitor-based solution for process monitoring.☆137Feb 9, 2020Updated 6 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Aug 5, 2017Updated 8 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 6 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- ☆22Mar 23, 2016Updated 9 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 12 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- taint tracer/analysis pintool☆26Jul 3, 2014Updated 11 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- TypeSan checks casts in C++ code - code released for CCS 2016☆36May 5, 2021Updated 4 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- ☆19Dec 19, 2019Updated 6 years ago
- modify binary Portable Executable to hook its export functions☆67Jan 13, 2019Updated 7 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Aug 22, 2018Updated 7 years ago
- Yet another Android Dex bytecode Disassembler: a static Android app disassembler for fast class and method signature extraction and code …☆30Dec 15, 2018Updated 7 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Sep 5, 2017Updated 8 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- ☆91Oct 28, 2016Updated 9 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- A pintool in order to unpack malware☆238Jul 30, 2016Updated 9 years ago
- BinSourcerer☆92Mar 1, 2022Updated 3 years ago
- Path based Dynamic Analysis☆118Mar 25, 2017Updated 8 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 7 years ago