A powerful static binary rewriting tool
-
Updated
Apr 16, 2025 - C
A powerful static binary rewriting tool
Omnitrace: Application Profiling, Tracing, and Analysis
An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.
Dynamic-Static binary instrumentation framework on top of GDB
Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enabling users to conduct malware analysis.
Reverse engineered API for Microsoft's Time Travel Debugger
A simple example of how to implement an Inline Hook
A binary instrumentation tool to analyze load instructions in any off-the-shelf x86(-64) program. Described by Bera et al. in https://arxiv.org/pdf/2406.18786
tool for monitoring x64 MSVC vtable calls
Experimental dynamic binary instrumentation
Flopz - Firmware Liberation on Python
Source References for Published CVE & Advisory
a tool that shows which lines of code are executing in a binary in realtime
Synthesizing black boxed library functions via symbolic execution and component based synthesis.
Suite of binary analysis tools for reverse engineering made in Rust with Python bindings.
AnvilELF is a purist object-oriented tool for ELF binary parsing, inspection, and modification ⚒️🔥
x86-64 dynamic taint tracking with Intel Pin 3.23
Add a description, image, and links to the binary-instrumentation topic page so that developers can more easily learn about it.
To associate your repository with the binary-instrumentation topic, visit your repo's landing page and select "manage topics."