Modular binary injection framework
☆18Jan 6, 2020Updated 6 years ago
Alternatives and similar repositories for libhooker
Users that are interested in libhooker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Modular binary injection framework, successor of libhooker☆102Nov 12, 2025Updated 6 months ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- ☆16Jan 27, 2019Updated 7 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 5 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- ☆20Mar 13, 2018Updated 8 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 7 years ago
- (fast) Capstone Go bindings☆11Aug 8, 2018Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆29Mar 30, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated last year
- An emulator for the ARM core in the Nintendo Wii, implemented with Unicorn☆14May 18, 2021Updated 5 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 10 years ago
- Some writeups in ctf.☆11Mar 31, 2022Updated 4 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- Zerokit shared code☆18Mar 28, 2019Updated 7 years ago
- Emulator interface for ARM 32-bit☆35Jun 4, 2018Updated 7 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago
- Start method tracing using Android's internal APIs☆13Dec 25, 2017Updated 8 years ago
- Analysis and Modification Tool for Executables☆18Mar 28, 2019Updated 7 years ago
- Tools for inspecting, analyzing and optimizing ELF files☆51Apr 11, 2026Updated last month
- Useful Plugin for IDA to Trace Function Call Tree☆26Jan 4, 2018Updated 8 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago