zandi / eBPF_processorLinks
An IDA processor for eBPF bytecode
☆67Updated 10 months ago
Alternatives and similar repositories for eBPF_processor
Users that are interested in eBPF_processor are comparing it to the libraries listed below
Sorting:
- An IDA processor for eBPF bytecode☆48Updated 3 years ago
- This is an IDA plugin to recover class information from C++ binary.☆18Updated 5 years ago
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- Static Binary Instrumentation☆122Updated 4 years ago
- Dark+ Theme☆49Updated last year
- ☆41Updated 3 years ago
- A /proc/mem IDA loader to snapshot a running process☆164Updated 3 months ago
- IDAPython / IDC tips and tricks☆38Updated 2 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 4 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- Recover 64 bit ELF executables from memory dump☆90Updated 6 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆25Updated 2 years ago
- ☆82Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Symbolic execution engine for Whitespace.☆14Updated 4 years ago
- linux kernel cross page attack demo module☆31Updated 2 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆91Updated 2 years ago
- qemu vulnerablity.☆54Updated 4 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- A useful IDA Notepad plug-in that can completely replace IDA’s native Notepad window.☆33Updated 10 months ago
- Dice CTF 2022 breach write-up☆15Updated 3 years ago
- IDA (sort of) headless☆26Updated last year
- ☆49Updated last year
- nanoMIPS IDA plugin☆68Updated 4 years ago
- Toy LLVM obfuscator pass☆75Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- linux system call hook framework☆47Updated 6 years ago
- ☆56Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago