Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.
☆42Jul 5, 2013Updated 12 years ago
Alternatives and similar repositories for IDAPinLogger
Users that are interested in IDAPinLogger are comparing it to the libraries listed below
Sorting:
- ☆14Jan 10, 2017Updated 9 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- obfuscate your c++ code with an external text file!☆10Nov 19, 2014Updated 11 years ago
- ☆30May 23, 2017Updated 8 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆133Oct 10, 2014Updated 11 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Collection of my IDAPython scripts☆33Sep 17, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- rebuild ollydbg☆20Feb 15, 2017Updated 9 years ago
- ☆11Jun 15, 2017Updated 8 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆96Mar 24, 2012Updated 13 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- ☆11Mar 11, 2015Updated 10 years ago
- fork from http://hashlib.codeplex.com☆12Oct 27, 2025Updated 4 months ago
- ☆12Dec 26, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- MIR-Engine☆23Jul 6, 2017Updated 8 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Immunity Debugger Taint Tracer☆20Jun 18, 2013Updated 12 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 8 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- A c++, QT gui based memory engine☆13Mar 6, 2018Updated 7 years ago
- ☆82Dec 3, 2017Updated 8 years ago
- ☆22May 25, 2017Updated 8 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- IDAPython plugin for finding function strings recursively☆133May 17, 2022Updated 3 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago