libvmcu-Virtual-MCU-Library
panda
libvmcu-Virtual-MCU-Library | panda | |
---|---|---|
11 | 7 | |
48 | 2,417 | |
- | 0.9% | |
0.0 | 9.3 | |
over 2 years ago | 6 days ago | |
C | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
libvmcu-Virtual-MCU-Library
- Libvmcu v0.8.11 – controlflow graph update
- libvmcu v.0.8.10 - Help Wanted
- Libvmcu v0.8.10
- Libvmcu v0.8.9 – Operand Rework
- Update: Libvmcu v0.8.8
- Libvmcu v0.8.7 – Help Wanted
- Libvmcu v0.7.4
- Libvmcu (help wanted – bindings, driver, tests)
- Libvmcu – Looking for Contributors
- libvmcu, Virtual MCU Library
panda
- Platform for Architecture-Neutral Dynamic Analysis (Panda)
-
Cannoli: The Fast QEMU Tracer
It's great to see new projects in this space! I wonder if you have compared Cannoli to panda [0]. If so, what was the outcome - especially regarding the performance?
[0] https://github.com/panda-re/panda
- Detecting vulnerabilities in IoT devices
-
Easy Hypervisor Heap Visualization with PyPANDA and HeapInspect
The basis for doing this from the hypervisor is Operating System Introspection (OSI). PANDA supports Windows OSI (https://github.com/panda-re/panda/tree/dev/panda/plugins/wintrospection) so I'd imagine similar techniques could be applied.
-
Using QEMU-user emulation to reverse engineer binaries
Another helpful option if you're trying to get traces out is `-d nochain`, which turns off translation block chaining (chaining inserts a direct jump from one block to the next, which can cause logging statements to be skipped).
Also, if anyone is interested in using QEMU for whole system reverse engineering, allow me to shill PANDA, which adds a plugin API, record/replay, and a nice Python interface for all of this:
https://panda.re/
-
Cuckoo Sandbox with Docker
I've had difficulty getting it working in the past. Dunno if capev2 or panda.re have docker options (panda.re is qemu based so I doubt they do, possibly capev2)
-
PyPANDA: Generic unpacking based on whole-system record and replay with Ghidra integration. Including interview with author of paper and tool Luke Craig.
Operating System Introspection (Windows and Linux)
What are some alternatives?
qiling - A True Instrumentable Binary Emulation Framework
AFLplusplus - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
swtpm - Libtpms-based TPM emulator with socket, character device, and Linux CUSE interface.
vgm_ripping - Sources for game music ripping tools
fsmon - monitor filesystem on iOS / OS X / Android / FirefoxOS / Linux
pandaheapinspect - 🔍Heap analysis tool for CTF pwn.