rehosting / penguinLinks
PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and tailored specification of the rehosting process
☆38Updated this week
Alternatives and similar repositories for penguin
Users that are interested in penguin are comparing it to the libraries listed below
Sorting:
- A MBR Fuzzer☆29Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆49Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆63Updated last month
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 3 months ago
- ☆56Updated 2 months ago
- ☆33Updated 8 months ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆19Updated 11 months ago
- Python Command-Line Ghidra MCP☆114Updated last week
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆83Updated 2 weeks ago
- ☆79Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆113Updated 3 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆119Updated 10 months ago
- ☆20Updated 3 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 9 months ago
- Leveraging patch diffing to discover new vulnerabilities☆134Updated 11 months ago
- ☆24Updated last month
- A tool for firmware cartography☆158Updated 3 months ago
- BINARLY Research Tools and PoCs☆37Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- ☆68Updated 7 months ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 5 years ago
- Arlo file format helper☆15Updated last year
- weggli ruleset scanner for source code and binaries☆31Updated 3 weeks ago
- Scripts from Ghidra Golf competitions☆34Updated 2 years ago
- ☆112Updated last month
- Binary Exploitation Phrack CTF Challenge☆132Updated last month