ucgJhe / Qdb
A multi-architecture and cross-platform debugger baked by Qiling Framework
☆83Updated 2 years ago
Alternatives and similar repositories for Qdb:
Users that are interested in Qdb are comparing it to the libraries listed below
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆47Updated 8 years ago
- A code-searching/completion tool, for IDA APIs☆81Updated last month
- Various debugging tools such as %DumpObjects for v8☆53Updated 6 years ago
- An IDA processor for eBPF bytecode☆62Updated 3 months ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- IDA_Signsrch in Python☆99Updated 4 years ago
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆166Updated 2 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆121Updated last year
- Static Binary Instrumentation☆119Updated 3 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 4 years ago
- ☆193Updated 2 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 6 years ago
- ☆55Updated last month
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆121Updated 11 months ago
- ☆41Updated 10 months ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- Toy LLVM obfuscator pass☆71Updated 3 years ago
- android kernel pwn☆19Updated 6 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆61Updated 5 years ago
- ☆34Updated 3 years ago
- Packages for IDA Pro (written in python but supports all)☆131Updated 4 years ago
- IDAPython 's note☆80Updated 6 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆181Updated 3 years ago
- qemu vulnerablity.☆51Updated 3 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆9Updated last week
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- The Frida based fuzzer all in one☆30Updated 3 years ago