pventuzelo / wasm_workshopLinks
"Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)
☆20Updated 4 years ago
Alternatives and similar repositories for wasm_workshop
Users that are interested in wasm_workshop are comparing it to the libraries listed below
Sorting:
- gopclntab finder and analyzer for Radare2☆20Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- A smali emulator.☆25Updated 7 years ago
- bash script and modified java program to headlessly use ghidra's decompiler☆57Updated 3 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- ☆76Updated 3 years ago
- qiling framework examples☆16Updated 3 years ago
- A library for patching ELFs☆57Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- The Dumb Network Fuzzer☆21Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- Ghidra plugin to communicate with radare2☆59Updated this week
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- ☆18Updated 3 years ago
- A Linux x86_64 ELF loader in user-space written in Rust☆39Updated 4 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- A plugin to integrate the Frida dynamic instrumentation toolkit into Binary Ninja.☆59Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- ☆21Updated 5 years ago