stoyan-shopov / troll
A source level debugger for C programs running on ARM Cortex-M parts. Utilizes the *blackmagic* probe and the *Qt* framework
☆58Updated 5 years ago
Alternatives and similar repositories for troll:
Users that are interested in troll are comparing it to the libraries listed below
- ☆39Updated 8 years ago
- REIL translation library☆36Updated 8 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆51Updated 3 years ago
- Translator from asm to C, but not decompiler. Something between compiler and decompiler.☆55Updated 3 years ago
- Lightweight Symbolic Execution Engine☆23Updated 9 years ago
- Python repository containing parsed standard C library function and argument information☆26Updated 6 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Snowman decompiler☆107Updated 7 years ago
- ELF/PE/Mach-O parsing library☆26Updated 6 months ago
- ☆24Updated 10 years ago
- GDB stub that allows debugging of embedded devices☆33Updated 9 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- Uncategorized utilities☆57Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 8 months ago
- SD/MMC Analyzer for Saleae Logic☆37Updated last year
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- binary toolkit☆12Updated 8 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 5 years ago
- Programmatic disassembly and patching☆67Updated 8 years ago
- Automated Return-Oriented Programming Chaining☆84Updated 8 years ago
- Tools for analyzing hexagon code☆38Updated 8 years ago
- Trust Zone Project☆21Updated 10 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- Linux hooking engine for ARM architecture☆16Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Updated 10 years ago
- Python bindings for Intel's XED☆29Updated 9 months ago
- A pin tool to visualise heap operations☆21Updated 9 years ago