thezdi / binaryninjaLinks
binary ninja related code
☆36Updated 4 months ago
Alternatives and similar repositories for binaryninja
Users that are interested in binaryninja are comparing it to the libraries listed below
Sorting:
- Python bindings for BochsCPU☆37Updated last week
- ☆82Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆35Updated last year
- Target components for kAFL/Nyx Fuzzer☆32Updated last month
- ☆49Updated 3 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆79Updated 2 years ago
- ☆47Updated 2 years ago
- WTF Snapshot fuzzing of macOS targets☆97Updated last year
- ☆39Updated 3 weeks ago
- ☆57Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Overview of Microsoft Patch Tuesday☆14Updated 11 months ago
- NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)☆108Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 6 months ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆58Updated 2 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆76Updated 6 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Updated 7 months ago
- Driver Security Analyzer☆53Updated 4 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆37Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 2 months ago
- ☆12Updated 3 years ago
- ☆29Updated 2 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago