dyninst
radare2
Our great sponsors
dyninst | radare2 | |
---|---|---|
3 | 1 | |
690 | 15,238 | |
1.0% | - | |
9.3 | 9.9 | |
4 days ago | over 2 years ago | |
C | C | |
GNU Lesser General Public License v3.0 only | GNU Lesser General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dyninst
-
Omnitrace: New Performance Analysis Tool for CPUs and GPUs by AMD Research
I think I actually saw the GitHub issue you filed with Dyninst. I noticed you were using Ubuntu 22.04 which I've encountered issues with myself. If you file a bug report on GitHub with some info about the segfault, I'll see what I can do to track it down.
-
What can you do with an ISA (Instruction Set Architecture) specification?
Also what are your thoughts on Dyninst for binary analysis? https://github.com/dyninst/dyninst
-
ASM but for c++…?
I think in C or C++ you would typically rather use shims or wrappers to replace functionality rather than manipulating it. Or you could use compiler plugins to do stuff for your. The only thing I can think of that manipulates the binary itself, is Dyninst.
radare2
-
Awesome CTF : Top Learning Resource Labs
radare2 - A portable reversing framework.
What are some alternatives?
NativeFramework - A non-complete Minecraft 1.8.9 C++ modding framework, for WINDOWS ONLY, there is minimal possiblility for change in the future
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy
volatility - An advanced memory forensics framework
pwntools - CTF framework and exploit development library
radare2-book - Radare2 official book
mal_unpack - Dynamic unpacker based on PE-sieve
snappy-fox - 🦀🦊 Snappy (Firefox morgue cache format) files de-compressor, works even if they're corrupted
pev - The PE file analysis toolkit
hollows_hunter - Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
navit - The open source (GPL v2) turn-by-turn navigation software for many OS
semblance - Disassembler for Windows executables. Supports 16-bit NE (New Executable), MZ (DOS), and PE (Portable Executable, i.e. Win32) files.