rehosting / penguinLinks
PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and tailored specification of the rehosting process
☆51Updated this week
Alternatives and similar repositories for penguin
Users that are interested in penguin are comparing it to the libraries listed below
Sorting:
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- ☆70Updated 6 months ago
- A tool for firmware cartography☆165Updated 2 months ago
- Leveraging patch diffing to discover new vulnerabilities☆139Updated last year
- ☆131Updated 5 months ago
- ☆70Updated 11 months ago
- ☆57Updated last year
- Arlo file format helper☆16Updated last year
- A MBR Fuzzer☆31Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆154Updated 3 weeks ago
- ☆120Updated 2 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- ☆330Updated last year
- Cross-architecture instruction counting for CTF solving☆48Updated 3 years ago
- An educational Bochs-based snapshot fuzzer project☆226Updated 3 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆284Updated last week
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆111Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆98Updated 7 months ago
- PASTIS: Collaborative Fuzzing Framework☆166Updated 3 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- Binary Type Inference Ghidra Plugin☆168Updated 2 years ago
- ☆45Updated 5 months ago
- Documentation for Vilo router vulnerability research☆15Updated last year
- ☆79Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73Updated 9 months ago
- ☆187Updated 2 years ago