zznop / vizzyLinks
Tool for profiling heap usage and memory management
☆27Updated 4 years ago
Alternatives and similar repositories for vizzy
Users that are interested in vizzy are comparing it to the libraries listed below
Sorting:
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Updated 11 months ago
- Frida plugin for Binary Ninja☆18Updated 9 months ago
- Another (bad) ROP gadget finder, but this time in Rust☆22Updated last year
- A binary hardening system☆109Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- gopclntab finder and analyzer for Radare2☆21Updated 5 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- A system call interception tool☆58Updated 10 months ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆42Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆12Updated 5 years ago
- Scripts from Ghidra Golf competitions☆34Updated 2 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Debugger and analyzer for ARM ELF executables.☆18Updated 3 years ago
- Symbolic execution in radare2 with angr☆39Updated 4 years ago
- ☆48Updated 5 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆16Updated 6 years ago
- ☆18Updated 5 years ago
- Binary (In)security tool☆25Updated last year
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 3 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- "Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)☆20Updated 5 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 8 months ago