yrp604 / bochscpu-buildLinks
☆16Updated 2 months ago
Alternatives and similar repositories for bochscpu-build
Users that are interested in bochscpu-build are comparing it to the libraries listed below
Sorting:
- ☆47Updated 2 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year
- A fork of AFL for fuzzing Windows binaries☆53Updated 6 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 6 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- haze binary fuzzer☆53Updated last year
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated last year
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆50Updated 4 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆53Updated this week
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Updated 5 months ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- Build your emulation environment as needed☆67Updated 4 years ago
- kernel pool windbg extension☆84Updated 9 years ago
- Target components for kAFL/Nyx Fuzzer☆34Updated last year
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆56Updated 3 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- ☆154Updated 6 years ago
- ☆41Updated 5 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago