rhelmot / dumpsterdiver
A tool to interactively explore the heap of a python process
☆24Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for dumpsterdiver
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆51Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 3 years ago
- ☆30Updated 4 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Updated 2 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆57Updated 2 years ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Updated 3 years ago
- Use Ghidra Structs in Python☆28Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆40Updated 5 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- Export a binary from ghidra to emulate with unicorn☆25Updated 5 years ago
- Collection of images and examples to use with Shoggoth.☆19Updated 4 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated last year
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- ☆46Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated 11 months ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- ☆21Updated 4 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆37Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆27Updated 3 years ago
- ☆17Updated 2 years ago
- x86/x64 architecture plugin☆39Updated 8 months ago
- ☆25Updated 4 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- View Linux perf traces in IDA Pro☆12Updated 5 years ago