Category: Reverse Engineering

Angora

Angora: mutation-based coverage guided fuzzer

Angora Angora is a mutation-based coverage guided fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution. Angora consists of a fuzzer, instrumenting compilers and runtime...

labeless

labeless v1.1.6 releases: Remote memory dumping tool

labeless Labeless is a plugin system for dynamic, seamless and real-time synchronization between IDA Database and debugs backend. It consists of two parts: IDA plugin and debugs backend’s plugin. Labeless significantly reduces the time that...

DIRT

DIRT: Driver Initial Reconnaissance Tool

DIRT: Driver Initial Reconnaissance Tool get an initial assessment of drivers installed on a Windows system (e.g. master images developed by OEMs or enterprises). It’s supposed to help with target selection, finding low-hanging fruit,...

Linux binary Exploitation

HITCON-Training for Linux binary Exploitation

HITCON-Training For Linux binary Exploitation Outline Basic Knowledge Introduction Reverse Engineering Static Analysis Dynamic Analysis Exploitation Useful Tool IDA PRO GDB Pwntool lab 1 – sysmagic Section Compile, linking, assembler Execution how program get...

IDArling

IDArling: collaborative reverse engineering plugin

IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows synchronizing in real-time the changes made to a database by multiple users, by connecting together different instances of IDA Pro. The main features...

exploitable

exploitable: The ‘exploitable’ GDB plugin

GDB ‘exploitable’ plugin The ‘exploitable’ plugin (exploitable/exploitable.py) ‘exploitable’ is a GDB extension that classifies Linux application bugs by severity. The extension inspects the state of a Linux application that has crashed and outputs a...