ucgJhe / Qdb
A multi-architecture and cross-platform debugger baked by Qiling Framework
☆82Updated 2 years ago
Alternatives and similar repositories for Qdb:
Users that are interested in Qdb are comparing it to the libraries listed below
- An IDA processor for eBPF bytecode☆62Updated 2 months ago
- A code-searching/completion tool, for IDA APIs☆81Updated 2 years ago
- IDA_Signsrch in Python☆98Updated 4 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆120Updated last year
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 8 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- ☆55Updated last week
- A port of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to Python☆166Updated 2 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆137Updated 5 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆40Updated 4 years ago
- Various debugging tools such as %DumpObjects for v8☆53Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 5 years ago
- IDAPyHelper is a script for the Interactive Disassembler that helps writing IDAPython scripts and plugins.☆168Updated 2 years ago
- ☆40Updated 9 months ago
- ☆81Updated 3 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆118Updated 10 months ago
- Static Binary Instrumentation☆119Updated 3 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆6Updated 3 years ago
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 6 years ago
- ☆33Updated 3 years ago
- REVerse ENGineering Environment☆57Updated 8 months ago
- PoC code for CVE-2019-14040☆26Updated 4 years ago
- ☆190Updated 2 years ago
- linux system call hook framework☆47Updated 6 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- Repository of code I've written during my twitch stream, "F'ing Around with Binary Ninja"☆107Updated 3 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago