Modular binary injection framework
☆18Jan 6, 2020Updated 6 years ago
Alternatives and similar repositories for libhooker
Users that are interested in libhooker are comparing it to the libraries listed below
Sorting:
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated 11 months ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- Modular binary injection framework, successor of libhooker☆97Nov 12, 2025Updated 3 months ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Screen recorder for x64dbg, for recording screen while debugging.☆11Jul 27, 2016Updated 9 years ago
- (fast) Capstone Go bindings☆11Aug 8, 2018Updated 7 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Tools for inspecting, analyzing and optimizing ELF files☆48Updated this week
- Socks 5 proxy☆12Aug 5, 2023Updated 2 years ago
- ☆16Jan 27, 2019Updated 7 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 4 years ago
- Emulating SAMSUNG HM641JI HDD firmware using Unicorn☆11Sep 19, 2022Updated 3 years ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated 11 months ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- Dracula inspired theme for Ghidra☆12Dec 3, 2019Updated 6 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- Emulator interface for ARM 32-bit☆35Jun 4, 2018Updated 7 years ago
- An emulator for the ARM core in the Nintendo Wii, implemented with Unicorn☆14May 18, 2021Updated 4 years ago
- A tool to inject C code into ELF64 binaries☆29May 25, 2021Updated 4 years ago
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- Minimalistic hooking library written in C☆60Jul 9, 2020Updated 5 years ago
- Start method tracing using Android's internal APIs☆13Dec 25, 2017Updated 8 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago