rehosting / penguinLinks
PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and tailored specification of the rehosting process
☆42Updated this week
Alternatives and similar repositories for penguin
Users that are interested in penguin are comparing it to the libraries listed below
Sorting:
- Binary Exploitation Phrack CTF Challenge☆65Updated 2 months ago
- A MBR Fuzzer☆29Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆58Updated 3 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆92Updated 4 months ago
- Arlo file format helper☆15Updated last year
- Python Command-Line Ghidra MCP☆129Updated last week
- A tool for firmware cartography☆160Updated 4 months ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆86Updated this week
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- BINARLY Research Tools and PoCs☆38Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- ☆116Updated last month
- Ghidra scripts for recovering string definitions in Go binaries☆120Updated 11 months ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆134Updated 2 months ago
- ☆79Updated last year
- ☆33Updated 8 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- weggli ruleset scanner for source code and binaries☆33Updated last month
- ☆54Updated last year
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated last week
- ☆22Updated last month
- Common Corpus is used to build coverage-minimized corpus data sets for fuzzing.☆27Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- ☆128Updated last year
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year