xorpse / parascope
weggli ruleset scanner for source code and binaries
☆29Updated 4 months ago
Alternatives and similar repositories for parascope
Users that are interested in parascope are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆31Updated 3 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆33Updated last week
- Ghidra analyzer for UEFI firmware.☆18Updated last year
- Diaphora Machine Learning tools and datasets☆21Updated 7 months ago
- A tool to perform so called BGE attack☆24Updated last year
- binary ninja related code☆35Updated last month
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆61Updated 2 months ago
- nanoMIPS module for Ghidra☆47Updated 5 months ago
- ☆21Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- Python bindings for BochsCPU☆35Updated 2 months ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆39Updated last month
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆40Updated 2 weeks ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆28Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- Kernel Read Write Execute☆42Updated 4 months ago
- ☆33Updated last year
- WebGL fuzzer☆38Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆60Updated last month
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Slides about HyperDbg☆30Updated last month
- Target components for kAFL/Nyx Fuzzer☆30Updated last month