teambi0s / rust_demangler
Python module for demangling rust function names
☆17Updated 3 years ago
Alternatives and similar repositories for rust_demangler:
Users that are interested in rust_demangler are comparing it to the libraries listed below
- Generates `.pyi` type stubs for the entire Ghidra API☆150Updated 2 months ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆112Updated last month
- AFL bindings for Unicorn-Engine☆71Updated 3 weeks ago
- Core emulator components for Icicle☆136Updated last month
- The Reverse Engineering Assistant of your dreams☆29Updated 3 years ago
- Run IDA scripts headlessly.☆128Updated last month
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆213Updated 4 years ago
- a new class of file structure attacks☆46Updated 2 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆149Updated last year
- A bare metal hypervisor that can run x86 assembly code, build using the Windows Hypervisor Platform API.☆8Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆182Updated 10 months ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated 8 months ago
- IDA command palette & more (Ctrl+Shift+P, Ctrl+P)☆156Updated 3 months ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆72Updated this week
- ☆136Updated 3 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆94Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆70Updated 2 months ago
- Practical P-Code examples☆45Updated 3 years ago
- Automate generation of syzkaller's grammar☆14Updated 2 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆76Updated 2 years ago
- ☆167Updated 11 months ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆15Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆75Updated 2 years ago
- angr's exploration technique to perform taint analysis☆55Updated 4 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- ☆190Updated 2 years ago
- Snapshot fuzzing with KVM and LibAFL☆94Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- Repository of code I've written during my twitch stream, "F'ing Around with Binary Ninja"☆107Updated 3 years ago
- ☆148Updated 3 weeks ago