☆41May 23, 2017Updated 8 years ago
Alternatives and similar repositories for CryptoHunt
Users that are interested in CryptoHunt are comparing it to the libraries listed below
Sorting:
- Automatic Identification of Cryptographic Primitives in Software☆32Mar 14, 2015Updated 11 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Rerousces related to time-travel debugging (TTD)☆33Jan 6, 2026Updated 2 months ago
- ☆15Jul 22, 2024Updated last year
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- ☆21Oct 2, 2018Updated 7 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- ☆57Oct 15, 2020Updated 5 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- ☆179Nov 25, 2018Updated 7 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆172Jan 27, 2015Updated 11 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Kernel-mode file scanner☆19Jul 16, 2018Updated 7 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- x86 Dynamic Binary Translator Library☆34Dec 19, 2020Updated 5 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Tool to resolve symbols by the address of the binary☆15Sep 21, 2018Updated 7 years ago
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆13Jan 2, 2018Updated 8 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- ☆90Jul 5, 2016Updated 9 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- Cryfind is a tool to help you find crypto signatures in binary.☆36Oct 19, 2021Updated 4 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Kernel Inject Process☆11Jul 28, 2017Updated 8 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago