zznop / vizzyLinks
Tool for profiling heap usage and memory management
☆27Updated 4 years ago
Alternatives and similar repositories for vizzy
Users that are interested in vizzy are comparing it to the libraries listed below
Sorting:
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Updated 3 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆46Updated last year
- Frida plugin for Binary Ninja☆20Updated last year
- Scripts from Ghidra Golf competitions☆34Updated 3 years ago
- A system call interception tool☆57Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Updated 5 years ago
- gopclntab finder and analyzer for Radare2☆21Updated 5 years ago
- A binary hardening system☆111Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆44Updated 2 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Updated last year
- Another (bad) ROP gadget finder, but this time in Rust☆22Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆30Updated 4 months ago
- Debugger and analyzer for ARM ELF executables.☆18Updated 3 years ago
- weggli ruleset scanner for source code and binaries☆37Updated 2 months ago
- ☆11Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆91Updated last week
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year
- Python interface for Binexport, the Bindiff export format☆19Updated last month
- CTF Challenge for CSAW Finals 2021☆13Updated 4 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- ☆15Updated 3 years ago