qiling
pwndbg
Our great sponsors
qiling | pwndbg | |
---|---|---|
10 | 9 | |
4,837 | 6,726 | |
7.5% | 4.1% | |
6.2 | 9.5 | |
about 1 month ago | 2 days ago | |
Python | Python | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
qiling
- Qiling: A True Instrumentable Binary Emulation Framework
-
Unicorn Engine problem with map
Sounds more like r/ReverseEngineering. If what you want to do is some dynamic analysis or just play around, maybe try using qiling, it's built on top of unicorn and is made by the same authors. It will take care of loading the file for you.
- qiling: Qiling Advanced Binary Emulation Framework
- Qiling Advanced Binary Emulation Framework
-
MoonBounce: UEFI Malware
https://github.com/qilingframework/qiling Is probably what you are looking for
- Qiling – Advanced Binary Emulation Framework
-
QilingLab: a series of challenges by Th3Zer0 to train your Qiling skills 💪🏾 -- solve 'em all and share your writeup!
It is s binary emulation framework, which you can use to emulate different binaries for different architectures. On top of that you can use Qiling APIs to debug the emulation process, hook syscalls, etc. It's like Unicorn + Qemu + Frida. More info here: https://github.com/qilingframework/qiling
- How to perform full MIPS system emulation with QEMU, using the squashfs image and uBoot kernel image extracted from a rotuer firmware?
-
PyPANDA: Generic unpacking based on whole-system record and replay with Ghidra integration. Including interview with author of paper and tool Luke Craig.
qiling is built on unicorn directly. qiling focuses on emulating binaries (read: emulating a single program and not an OS). It uses the binary blob work to load binaries and their associated shared objects. It then hooks the OS calls and presents an interface to the program as though it has interacted with an OS. see here
-
Opensource Security Framework Stake Pool
We started this project since 2019 Nov, currently they are around 70+ developers and 2,200++ stars in our Github page (https://github.com/qilingframework/qiling)
pwndbg
-
Any tips for newish C debugging please.
By far the best debugger for C is gdb+pwndbg (https://github.com/pwndbg/pwndbg)
- Need help installing pwndbg on Kali Linux
-
Hacked GDB Dashboard Puts It All on Display
There are a lot of these types of tools already in the reverse engineering community (in order of lowest chance of breaking when you throw really weird stuff at it):
GEF: https://gef.readthedocs.io/en/master/
PWNDBG: https://github.com/pwndbg/pwndbg
PEDA: https://github.com/longld/peda
They also come with a slew of different features to aid in RE/exploit dev, but many of them are also useful for debugging really weird issues.
-
Debugging with GDB
GDB is great. I definitely recommend checking out watchpoints as well, a very useful tool for monitoring how a variable changes over time.
GDB also has many good plugins - pwndbg has tons of features and UI improvements over stock GDB.
https://github.com/pwndbg/pwndbg
-
Making GDB Easier: The TUI Interface
I've recently started a new semester for my Master's program, and the first project for the semester involves using the GDB tool (GNU Debugger) to analyze a stack on a simple C program that contains a buffer overflow vulnerability. A couple of semesters ago, I had been given a VM pre-loaded with a more featured debugger tool called pwndbg. Pwndbg was excellent because it was easy to use and easily allowed accessed to information such as current assembly code being executed and a view of the program registers. So, going back to using GDB felt a little like stepping back into the stone age.
-
Awesome CTF : Top Learning Resource Labs
Pwndbg - A GDB plugin that provides a suite of utilities to hack around GDB easily.
- Trouble downloading pwndbg
-
Problem in downloading pwndbg
i have peda installed on my gdb and now i am trying to install pwndbg with git clone https://github.com/pwndbg/pwndbg cd pwndbg ./setup.sh
What are some alternatives?
angr - A powerful and user-friendly binary analysis platform!
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
frontier-silicon-firmwares - Frontier silicon internet radio firmware binaries
peda - PEDA - Python Exploit Development Assistance for GDB
panda - Platform for Architecture-Neutral Dynamic Analysis
pwntools - CTF framework and exploit development library
drakvuf-sandbox - DRAKVUF Sandbox - automated hypervisor-level malware analysis system
gdb-dashboard - Modular visual interface for GDB in Python
simplify - Android virtual machine and deobfuscator
one_gadget - The best tool for finding one gadget RCE in libc.so.6
ddisasm - A fast and accurate disassembler
voltron - A hacky debugger UI for hackers