A powerful static binary rewriting tool
-
Updated
Dec 21, 2024 - C
A powerful static binary rewriting tool
Omnitrace: Application Profiling, Tracing, and Analysis
An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.
Dynamic-Static binary instrumentation framework on top of GDB
Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enabling users to conduct malware analysis.
Reverse engineered API for Microsoft's Time Travel Debugger
A binary instrumentation tool to analyze load instructions in any off-the-shelf x86(-64) program. Described by Bera et al. in https://arxiv.org/pdf/2406.18786
A simple example of how to implement an Inline Hook
tool for monitoring x64 MSVC vtable calls
Flopz - Firmware Liberation on Python
Experimental dynamic binary instrumentation
Source References for Published CVE & Advisory
a tool that shows which lines of code are executing in a binary in realtime
Synthesizing black boxed library functions via symbolic execution and component based synthesis.
x86-64 dynamic taint tracking with Intel Pin 3.23
Suite of binary analysis tools for reverse engineering made in Rust with Python bindings.
Add a description, image, and links to the binary-instrumentation topic page so that developers can more easily learn about it.
To associate your repository with the binary-instrumentation topic, visit your repo's landing page and select "manage topics."