tathanhdinh / keystone-rsLinks
Rust binding for Keystone assembler framework
☆11Updated 7 years ago
Alternatives and similar repositories for keystone-rs
Users that are interested in keystone-rs are comparing it to the libraries listed below
Sorting:
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated 2 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 3 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- x86/x64 architecture plugin☆40Updated last year
- A stateful fuzzing engine.☆45Updated 7 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 7 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 5 years ago
- ☆17Updated 5 years ago
- A repository with simple projects created for testing/learning purpose☆46Updated 3 weeks ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- ☆49Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 5 years ago
- ☆37Updated 3 years ago
- idapm is IDA Plugin Manager via GitHub Repository.☆60Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 6 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆52Updated 3 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago
- My notes about Genyatyk VM crackme☆26Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago