ucgJhe / QdbLinks
A multi-architecture and cross-platform debugger baked by Qiling Framework
☆88Updated 3 years ago
Alternatives and similar repositories for Qdb
Users that are interested in Qdb are comparing it to the libraries listed below
Sorting:
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 5 years ago
- IDA_Signsrch in Python☆108Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 9 months ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆69Updated 5 years ago
- An IDA processor for eBPF bytecode☆68Updated 11 months ago
- ☆61Updated 9 months ago
- 基于angr的污点分析引擎☆41Updated 6 years ago
- linux system call hook framework☆46Updated 6 years ago
- A set of Android binary exploitation tasks for beginners.☆29Updated 6 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- Static Binary Instrumentation☆121Updated 4 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆90Updated 6 years ago
- nanoMIPS IDA plugin☆68Updated 4 years ago
- BPF Processor for IDA Python☆52Updated 7 years ago
- qemu vulnerablity.☆54Updated 4 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆12Updated 8 months ago
- ☆33Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆126Updated 2 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Resources About Dynamic Binary Instrumentation and Dynamic Binary Analysis☆136Updated 5 years ago
- android kernel pwn☆18Updated 6 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- PoC code for CVE-2019-14040☆27Updated 5 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 7 years ago
- CTF Write-ups☆29Updated 4 years ago
- This is an IDA plugin to recover class information from C++ binary.☆18Updated 5 years ago
- A collection of POP exploits.☆30Updated 4 years ago