trailofbits / appjaillauncher-rs
AppJailLauncher in Rust
☆109Updated 3 years ago
Alternatives and similar repositories for appjaillauncher-rs:
Users that are interested in appjaillauncher-rs are comparing it to the libraries listed below
- Sandboxed, Rust-based, Windows Defender Client☆177Updated 7 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- grap: define and match graph patterns within binaries☆170Updated 3 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- A program to draw rectangles from heap traces.☆132Updated 4 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Updated 2 years ago
- Run basic functions from stripped binaries cross platform☆110Updated 8 years ago
- rune - radare2 based symbolic emulator☆26Updated 7 years ago
- RAIR: RAdare In Rust☆74Updated 4 months ago
- Infrastructure for Reassembleable Disassembling and Transformation☆197Updated 2 weeks ago
- Semantic Binary Code Analysis Framework☆125Updated 9 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆110Updated 8 years ago
- ☆67Updated 3 years ago
- A fast Rust-based safe and thead-friendly grammar-based fuzz generator☆215Updated 4 years ago
- Uncovering Class Hierarchies in C++ Programs☆126Updated 2 years ago
- aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.☆169Updated 10 years ago
- Rust bindings for the unicorn CPU emulator☆139Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Binary Analysis Framework in Rust☆554Updated last year
- ☆104Updated 9 years ago
- Custom memory allocator that helps discover reads from uninitialized memory☆162Updated 4 years ago
- Slides and very basic examples☆111Updated 7 years ago
- Rewriting functions in compiled binaries using McSema☆87Updated 5 years ago
- An amd64 symbolic emulator☆313Updated 3 years ago
- Binary coverage tool without binary modification for Windows☆430Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆128Updated 2 years ago
- ☆173Updated 2 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 2 years ago