A powerful static binary rewriting tool
-
Updated
Aug 9, 2024 - C
A powerful static binary rewriting tool
Omnitrace: Application Profiling, Tracing, and Analysis
An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.
Dynamic-Static binary instrumentation framework on top of GDB
Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enabling users to conduct malware analysis.
Reverse engineered API for Microsoft's Time Travel Debugger
A binary instrumentation tool to analyze load instructions in any off-the-shelf x86(-64) program. Described by Bera et al. in https://arxiv.org/pdf/2406.18786
A simple example of how to implement an Inline Hook
tool for monitoring x64 MSVC vtable calls
Flopz - Firmware Liberation on Python
Experimental dynamic binary instrumentation
Source References for Published CVE & Advisory
Synthesizing black boxed library functions via symbolic execution and component based synthesis.
a tool that shows which lines of code are executing in a binary in realtime
x86-64 dynamic taint tracking with Intel Pin 3.23
Add a description, image, and links to the binary-instrumentation topic page so that developers can more easily learn about it.
To associate your repository with the binary-instrumentation topic, visit your repo's landing page and select "manage topics."