shun-yo / Spaniel
Malware analysis tool based on taint analysis.
☆14Updated 3 years ago
Alternatives and similar repositories for Spaniel:
Users that are interested in Spaniel are comparing it to the libraries listed below
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- prebuild angr wheels for Windows on x86_64☆14Updated 6 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- convert binary to VEX IR using the C interface provided by pyvex.☆16Updated 2 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- ☆11Updated 6 years ago
- ☆18Updated 6 years ago
- ☆14Updated 7 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Updated 5 years ago
- Crappy Win32k syscall fuzzer☆13Updated 9 years ago
- Browser Fuzzing with Machine Learning☆22Updated 6 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 5 years ago
- ☆31Updated 7 years ago
- Idapro cpu for OpenRISC arch☆15Updated 8 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Ruby ALPC Fuzzer ( joke )☆24Updated 10 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- ☆12Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 7 years ago
- Some writeups in ctf.☆11Updated 3 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago