t00sh / p-sandbox
A ptrace based sandbox. (PoC)
☆14Updated 6 years ago
Alternatives and similar repositories for p-sandbox:
Users that are interested in p-sandbox are comparing it to the libraries listed below
- Simple Library calls tracer☆22Updated 6 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Updated 4 years ago
- ☆17Updated 6 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- BIOS-based boot menu and loader☆16Updated 8 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 4 years ago
- A tool that allows you to assemble and emulate assembly in multiple archs for learning purposes☆13Updated 5 years ago
- radare2 cLEMENCy plugins☆23Updated 7 years ago
- libs2e.so☆20Updated 4 years ago
- Heap analysis tooling for dlmalloc☆27Updated 2 years ago
- S2E Core Engine Library☆15Updated 5 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- ☆12Updated 7 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆77Updated 7 years ago
- Simple VM-based scripting language☆13Updated 4 years ago
- A simple library focusing on demangling symbols for different programing languages☆42Updated 4 years ago
- Resources for reverse engineering Go binaries☆41Updated 10 years ago
- Design documents related to the decompilation pipeline.☆25Updated 4 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆19Updated 5 years ago
- Ditto.☆17Updated 4 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- ☆12Updated 7 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Updated 5 years ago
- WTF are those magic numbers?!!☆33Updated 3 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆21Updated 5 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 7 years ago
- Sample code for ARM hardware virtualization☆10Updated 9 years ago