Category: Reverse Engineering

xenpwn

Xenpwn: toolkit for memory access tracing

Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization. It runs as a normal user space application inside the management domain (dom0) of a Xen hypervisor and can...

TitanHide

TitanHide: Hiding kernel-driver for x86/x64

TitanHide is a driver intended to hide debuggers from certain processes. The driver hooks various Nt* kernel functions (using SSDT table hooks) and modifies the return values of the original...

pwnworks

pwnworks: Exploitation challenges for CTF

CTF Works Tools and scripts for CTF exploit/pwnable challenge development. Challenge Organization Each challenge goes in its own directory in challenges/${challenge} Each challenge must be packaged as a docker container and must have a Dockerfile...

voltron

voltron: A hacky debugger UI for hackers

Voltron is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB, and WinDbg) by enabling the attachment of...

ripr

ripr: Package Binary Code

ripr is a tool that helps you rip out functionality from binary code and use it from python. It accomplishes this by pairing the Unicorn-Engine with Binary Ninja. Currently, x86, x64, and arm are supported and work...