☆18Sep 22, 2017Updated 8 years ago
Alternatives and similar repositories for call-graphs
Users that are interested in call-graphs are comparing it to the libraries listed below
Sorting:
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- iOS Userland Forensic Dumping Framework for iOS 7/8☆20Oct 30, 2018Updated 7 years ago
- Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code☆52Jan 19, 2016Updated 10 years ago
- MapGuard is a library that enforces a security policy for mmap based page allocations.☆21Dec 14, 2025Updated 3 months ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆23Dec 5, 2017Updated 8 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Mar 9, 2024Updated 2 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- Bootloader research tools (very much a work in progress)☆37Apr 5, 2019Updated 6 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- ROP database plugin for IDA☆32Jun 5, 2018Updated 7 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- Shim to grab keystore backed data☆27Sep 21, 2017Updated 8 years ago
- ☆18Oct 4, 2016Updated 9 years ago
- JSONAPI middleware for redux☆16Jan 4, 2023Updated 3 years ago
- ☆14Oct 29, 2020Updated 5 years ago
- Uses your Magic the Gathering library to identify decks you can build.☆32Oct 17, 2017Updated 8 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆46May 2, 2019Updated 6 years ago
- Recon system hardening scanner☆47Sep 9, 2016Updated 9 years ago
- Plugins for IDA Pro and Hex-Rays☆46Jun 4, 2018Updated 7 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- ☆21Jan 4, 2020Updated 6 years ago
- hid emulation tools for the usbarmory☆68Dec 12, 2016Updated 9 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- 16-bit Amiga classic title remake with HTML5 and PixiJS.☆10Oct 13, 2025Updated 5 months ago
- Dealing with Mach-O kexts, vtables and more☆87Dec 15, 2018Updated 7 years ago
- Deprecated, use ocaml-ppx/ppxlib instead☆13Mar 29, 2018Updated 7 years ago
- My setup for building a custom OpenWRT firmware using Vagrant☆24Sep 16, 2013Updated 12 years ago
- An Android port of radamsa fuzzer☆68Dec 24, 2019Updated 6 years ago
- Simple Simulator of ARMv6m instructions☆18May 23, 2017Updated 8 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago