quarkslab / python-binexport
Python interface for Binexport, the Bindiff export format
☆14Updated 3 weeks ago
Alternatives and similar repositories for python-binexport:
Users that are interested in python-binexport are comparing it to the libraries listed below
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- IDA (sort of) headless☆23Updated last year
- Ghidra analyzer for UEFI firmware.☆15Updated last year
- ☆14Updated 2 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- ☆18Updated 3 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆22Updated 3 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- ☆29Updated 4 years ago
- ☆11Updated 5 months ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- ☆12Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- prebuild angr wheels for Windows on x86_64☆14Updated 6 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Here I store my proof of concepts☆14Updated 6 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- binary ninja related code☆25Updated 2 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- ☆28Updated 4 years ago
- Python bindings for BochsCPU☆35Updated 3 weeks ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- ☆30Updated 4 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- A tool to perform so called BGE attack☆24Updated 11 months ago
- ☆33Updated 2 years ago